Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3580 (GCVE-0-2021-3580)
Vulnerability from cvelistv5 – Published: 2021-08-05 00:00 – Updated: 2024-11-19 14:24{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:01:06.534Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"name": "[debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20211104-0006/"
},
{
"name": "GLSA-202401-24",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202401-24"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-3580",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-19T14:22:19.550074Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-19T14:24:23.265Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "nettle",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "nettle 3.7.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-16T15:06:19.141Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"name": "[debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20211104-0006/"
},
{
"name": "GLSA-202401-24",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202401-24"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2021-3580",
"datePublished": "2021-08-05T00:00:00.000Z",
"dateReserved": "2021-06-04T00:00:00.000Z",
"dateUpdated": "2024-11-19T14:24:23.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-3580",
"date": "2026-05-19",
"epss": "0.00104",
"percentile": "0.27759"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.7.3\", \"matchCriteriaId\": \"F76873D4-2279-47A8-BE90-A69BB90294CB\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.\"}, {\"lang\": \"es\", \"value\": \"Se ha encontrado un fallo en la manera en que las funciones de descifrado RSA de Nettle manejan el texto cifrado especialmente dise\\u00f1ado. Un atacante podr\\u00eda usar este fallo para proporcionar un texto cifrado manipulado, conllevando al bloqueo de la aplicaci\\u00f3n y la denegaci\\u00f3n de servicio\"}]",
"id": "CVE-2021-3580",
"lastModified": "2024-11-21T06:21:53.797",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-08-05T21:15:12.853",
"references": "[{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1967983\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202401-24\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211104-0006/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1967983\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202401-24\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211104-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-3580\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2021-08-05T21:15:12.853\",\"lastModified\":\"2024-11-21T06:21:53.797\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo en la manera en que las funciones de descifrado RSA de Nettle manejan el texto cifrado especialmente dise\u00f1ado. Un atacante podr\u00eda usar este fallo para proporcionar un texto cifrado manipulado, conllevando al bloqueo de la aplicaci\u00f3n y la denegaci\u00f3n de servicio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.7.3\",\"matchCriteriaId\":\"F76873D4-2279-47A8-BE90-A69BB90294CB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1967983\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202401-24\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20211104-0006/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1967983\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202401-24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20211104-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1967983\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html\", \"name\": \"[debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211104-0006/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202401-24\", \"name\": \"GLSA-202401-24\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T17:01:06.534Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-3580\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-19T14:22:19.550074Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-19T14:24:19.666Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"nettle\", \"versions\": [{\"status\": \"affected\", \"version\": \"nettle 3.7.3\"}]}], \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1967983\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html\", \"name\": \"[debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211104-0006/\"}, {\"url\": \"https://security.gentoo.org/glsa/202401-24\", \"name\": \"GLSA-202401-24\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2024-01-16T15:06:19.141Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-3580\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-19T14:24:23.265Z\", \"dateReserved\": \"2021-06-04T00:00:00.000Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2021-08-05T00:00:00.000Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-52FP-4722-WCJW
Vulnerability from github – Published: 2022-05-24 19:10 – Updated: 2024-01-16 15:30A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
{
"affected": [],
"aliases": [
"CVE-2021-3580"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-08-05T21:15:00Z",
"severity": "HIGH"
},
"details": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
"id": "GHSA-52fp-4722-wcjw",
"modified": "2024-01-16T15:30:25Z",
"published": "2022-05-24T19:10:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3580"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202401-24"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20211104-0006"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
alsa-2021:4451
Vulnerability from osv_almalinux
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)
Security Fix(es):
-
nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)
-
gnutls: Use after free in client key_share extension (CVE-2021-20231)
-
gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
| URL | Type | |
|---|---|---|
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnutls"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6.16-4.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnutls-c++"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6.16-4.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnutls-dane"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6.16-4.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnutls-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6.16-4.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnutls-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6.16-4.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nettle"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.4.1-7.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nettle-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.4.1-7.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.\n\nNettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.\n\nThe following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)\n\nSecurity Fix(es):\n\n* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)\n\n* gnutls: Use after free in client key_share extension (CVE-2021-20231)\n\n* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2021:4451",
"modified": "2021-11-12T10:20:56Z",
"published": "2021-11-09T09:23:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2021-4451.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-20231"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-20232"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3580"
}
],
"related": [
"CVE-2021-3580",
"CVE-2021-20231",
"CVE-2021-20232"
],
"summary": "Moderate: gnutls and nettle security, bug fix, and enhancement update"
}
OPENSUSE-SU-2021:0906-1
Vulnerability from csaf_opensuse - Published: 2021-06-24 09:52 - Updated: 2021-06-24 09:52| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libnettle",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libnettle fixes the following issues:\n\n- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-906",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0906-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:0906-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4XGPKTRWLOEATNJNZGQZCO6BZTKIKJ6/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:0906-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4XGPKTRWLOEATNJNZGQZCO6BZTKIKJ6/"
},
{
"category": "self",
"summary": "SUSE Bug 1187060",
"url": "https://bugzilla.suse.com/1187060"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3580 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3580/"
}
],
"title": "Security update for libnettle",
"tracking": {
"current_release_date": "2021-06-24T09:52:27Z",
"generator": {
"date": "2021-06-24T09:52:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:0906-1",
"initial_release_date": "2021-06-24T09:52:27Z",
"revision_history": [
{
"date": "2021-06-24T09:52:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libhogweed4-3.4.1-lp152.4.6.1.i586",
"product": {
"name": "libhogweed4-3.4.1-lp152.4.6.1.i586",
"product_id": "libhogweed4-3.4.1-lp152.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.4.1-lp152.4.6.1.i586",
"product": {
"name": "libnettle-devel-3.4.1-lp152.4.6.1.i586",
"product_id": "libnettle-devel-3.4.1-lp152.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "libnettle6-3.4.1-lp152.4.6.1.i586",
"product": {
"name": "libnettle6-3.4.1-lp152.4.6.1.i586",
"product_id": "libnettle6-3.4.1-lp152.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "nettle-3.4.1-lp152.4.6.1.i586",
"product": {
"name": "nettle-3.4.1-lp152.4.6.1.i586",
"product_id": "nettle-3.4.1-lp152.4.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libhogweed4-3.4.1-lp152.4.6.1.x86_64",
"product": {
"name": "libhogweed4-3.4.1-lp152.4.6.1.x86_64",
"product_id": "libhogweed4-3.4.1-lp152.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64",
"product": {
"name": "libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64",
"product_id": "libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.4.1-lp152.4.6.1.x86_64",
"product": {
"name": "libnettle-devel-3.4.1-lp152.4.6.1.x86_64",
"product_id": "libnettle-devel-3.4.1-lp152.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64",
"product": {
"name": "libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64",
"product_id": "libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle6-3.4.1-lp152.4.6.1.x86_64",
"product": {
"name": "libnettle6-3.4.1-lp152.4.6.1.x86_64",
"product_id": "libnettle6-3.4.1-lp152.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64",
"product": {
"name": "libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64",
"product_id": "libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "nettle-3.4.1-lp152.4.6.1.x86_64",
"product": {
"name": "nettle-3.4.1-lp152.4.6.1.x86_64",
"product_id": "nettle-3.4.1-lp152.4.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed4-3.4.1-lp152.4.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.i586"
},
"product_reference": "libhogweed4-3.4.1-lp152.4.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed4-3.4.1-lp152.4.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.x86_64"
},
"product_reference": "libhogweed4-3.4.1-lp152.4.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64"
},
"product_reference": "libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.4.1-lp152.4.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.i586"
},
"product_reference": "libnettle-devel-3.4.1-lp152.4.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.4.1-lp152.4.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.x86_64"
},
"product_reference": "libnettle-devel-3.4.1-lp152.4.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64"
},
"product_reference": "libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle6-3.4.1-lp152.4.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.i586"
},
"product_reference": "libnettle6-3.4.1-lp152.4.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle6-3.4.1-lp152.4.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.x86_64"
},
"product_reference": "libnettle6-3.4.1-lp152.4.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64"
},
"product_reference": "libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.4.1-lp152.4.6.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.i586"
},
"product_reference": "nettle-3.4.1-lp152.4.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.4.1-lp152.4.6.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.x86_64"
},
"product_reference": "nettle-3.4.1-lp152.4.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3580"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3580",
"url": "https://www.suse.com/security/cve/CVE-2021-3580"
},
{
"category": "external",
"summary": "SUSE Bug 1187060 for CVE-2021-3580",
"url": "https://bugzilla.suse.com/1187060"
},
{
"category": "external",
"summary": "SUSE Bug 1187892 for CVE-2021-3580",
"url": "https://bugzilla.suse.com/1187892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libhogweed4-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libhogweed4-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libnettle-devel-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle-devel-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:libnettle6-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:libnettle6-32bit-3.4.1-lp152.4.6.1.x86_64",
"openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.i586",
"openSUSE Leap 15.2:nettle-3.4.1-lp152.4.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-24T09:52:27Z",
"details": "important"
}
],
"title": "CVE-2021-3580"
}
]
}
OPENSUSE-SU-2021:2143-1
Vulnerability from csaf_opensuse - Published: 2021-07-11 08:40 - Updated: 2021-07-11 08:40| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libhogweed4-32bit-3.4.1-4.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle-devel-32bit-3.4.1-4.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libnettle6-32bit-3.4.1-4.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:nettle-3.4.1-4.18.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:nettle-3.4.1-4.18.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:nettle-3.4.1-4.18.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:nettle-3.4.1-4.18.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libnettle",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libnettle fixes the following issues:\n\n- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2143",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2143-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2143-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZAR7UXBYGOSW57CMLBEWIM7KTCVMXFZ/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2143-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZAR7UXBYGOSW57CMLBEWIM7KTCVMXFZ/"
},
{
"category": "self",
"summary": "SUSE Bug 1187060",
"url": "https://bugzilla.suse.com/1187060"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3580 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3580/"
}
],
"title": "Security update for libnettle",
"tracking": {
"current_release_date": "2021-07-11T08:40:53Z",
"generator": {
"date": "2021-07-11T08:40:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2143-1",
"initial_release_date": "2021-07-11T08:40:53Z",
"revision_history": [
{
"date": "2021-07-11T08:40:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libhogweed4-3.4.1-4.18.1.aarch64",
"product": {
"name": "libhogweed4-3.4.1-4.18.1.aarch64",
"product_id": "libhogweed4-3.4.1-4.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.4.1-4.18.1.aarch64",
"product": {
"name": "libnettle-devel-3.4.1-4.18.1.aarch64",
"product_id": "libnettle-devel-3.4.1-4.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "libnettle6-3.4.1-4.18.1.aarch64",
"product": {
"name": "libnettle6-3.4.1-4.18.1.aarch64",
"product_id": "libnettle6-3.4.1-4.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "nettle-3.4.1-4.18.1.aarch64",
"product": {
"name": "nettle-3.4.1-4.18.1.aarch64",
"product_id": "nettle-3.4.1-4.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libhogweed4-3.4.1-4.18.1.ppc64le",
"product": {
"name": "libhogweed4-3.4.1-4.18.1.ppc64le",
"product_id": "libhogweed4-3.4.1-4.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.4.1-4.18.1.ppc64le",
"product": {
"name": "libnettle-devel-3.4.1-4.18.1.ppc64le",
"product_id": "libnettle-devel-3.4.1-4.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libnettle6-3.4.1-4.18.1.ppc64le",
"product": {
"name": "libnettle6-3.4.1-4.18.1.ppc64le",
"product_id": "libnettle6-3.4.1-4.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nettle-3.4.1-4.18.1.ppc64le",
"product": {
"name": "nettle-3.4.1-4.18.1.ppc64le",
"product_id": "nettle-3.4.1-4.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libhogweed4-3.4.1-4.18.1.s390x",
"product": {
"name": "libhogweed4-3.4.1-4.18.1.s390x",
"product_id": "libhogweed4-3.4.1-4.18.1.s390x"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.4.1-4.18.1.s390x",
"product": {
"name": "libnettle-devel-3.4.1-4.18.1.s390x",
"product_id": "libnettle-devel-3.4.1-4.18.1.s390x"
}
},
{
"category": "product_version",
"name": "libnettle6-3.4.1-4.18.1.s390x",
"product": {
"name": "libnettle6-3.4.1-4.18.1.s390x",
"product_id": "libnettle6-3.4.1-4.18.1.s390x"
}
},
{
"category": "product_version",
"name": "nettle-3.4.1-4.18.1.s390x",
"product": {
"name": "nettle-3.4.1-4.18.1.s390x",
"product_id": "nettle-3.4.1-4.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libhogweed4-3.4.1-4.18.1.x86_64",
"product": {
"name": "libhogweed4-3.4.1-4.18.1.x86_64",
"product_id": "libhogweed4-3.4.1-4.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "libhogweed4-32bit-3.4.1-4.18.1.x86_64",
"product": {
"name": "libhogweed4-32bit-3.4.1-4.18.1.x86_64",
"product_id": "libhogweed4-32bit-3.4.1-4.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.4.1-4.18.1.x86_64",
"product": {
"name": "libnettle-devel-3.4.1-4.18.1.x86_64",
"product_id": "libnettle-devel-3.4.1-4.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-32bit-3.4.1-4.18.1.x86_64",
"product": {
"name": "libnettle-devel-32bit-3.4.1-4.18.1.x86_64",
"product_id": "libnettle-devel-32bit-3.4.1-4.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle6-3.4.1-4.18.1.x86_64",
"product": {
"name": "libnettle6-3.4.1-4.18.1.x86_64",
"product_id": "libnettle6-3.4.1-4.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle6-32bit-3.4.1-4.18.1.x86_64",
"product": {
"name": "libnettle6-32bit-3.4.1-4.18.1.x86_64",
"product_id": "libnettle6-32bit-3.4.1-4.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "nettle-3.4.1-4.18.1.x86_64",
"product": {
"name": "nettle-3.4.1-4.18.1.x86_64",
"product_id": "nettle-3.4.1-4.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed4-3.4.1-4.18.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.aarch64"
},
"product_reference": "libhogweed4-3.4.1-4.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed4-3.4.1-4.18.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.ppc64le"
},
"product_reference": "libhogweed4-3.4.1-4.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed4-3.4.1-4.18.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.s390x"
},
"product_reference": "libhogweed4-3.4.1-4.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed4-3.4.1-4.18.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.x86_64"
},
"product_reference": "libhogweed4-3.4.1-4.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed4-32bit-3.4.1-4.18.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libhogweed4-32bit-3.4.1-4.18.1.x86_64"
},
"product_reference": "libhogweed4-32bit-3.4.1-4.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.4.1-4.18.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.aarch64"
},
"product_reference": "libnettle-devel-3.4.1-4.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.4.1-4.18.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.ppc64le"
},
"product_reference": "libnettle-devel-3.4.1-4.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.4.1-4.18.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.s390x"
},
"product_reference": "libnettle-devel-3.4.1-4.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.4.1-4.18.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.x86_64"
},
"product_reference": "libnettle-devel-3.4.1-4.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-32bit-3.4.1-4.18.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle-devel-32bit-3.4.1-4.18.1.x86_64"
},
"product_reference": "libnettle-devel-32bit-3.4.1-4.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle6-3.4.1-4.18.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.aarch64"
},
"product_reference": "libnettle6-3.4.1-4.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle6-3.4.1-4.18.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.ppc64le"
},
"product_reference": "libnettle6-3.4.1-4.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle6-3.4.1-4.18.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.s390x"
},
"product_reference": "libnettle6-3.4.1-4.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle6-3.4.1-4.18.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.x86_64"
},
"product_reference": "libnettle6-3.4.1-4.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle6-32bit-3.4.1-4.18.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libnettle6-32bit-3.4.1-4.18.1.x86_64"
},
"product_reference": "libnettle6-32bit-3.4.1-4.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.4.1-4.18.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nettle-3.4.1-4.18.1.aarch64"
},
"product_reference": "nettle-3.4.1-4.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.4.1-4.18.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nettle-3.4.1-4.18.1.ppc64le"
},
"product_reference": "nettle-3.4.1-4.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.4.1-4.18.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nettle-3.4.1-4.18.1.s390x"
},
"product_reference": "nettle-3.4.1-4.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.4.1-4.18.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nettle-3.4.1-4.18.1.x86_64"
},
"product_reference": "nettle-3.4.1-4.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3580"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libhogweed4-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle-devel-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle6-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3580",
"url": "https://www.suse.com/security/cve/CVE-2021-3580"
},
{
"category": "external",
"summary": "SUSE Bug 1187060 for CVE-2021-3580",
"url": "https://bugzilla.suse.com/1187060"
},
{
"category": "external",
"summary": "SUSE Bug 1187892 for CVE-2021-3580",
"url": "https://bugzilla.suse.com/1187892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libhogweed4-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle-devel-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle6-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libhogweed4-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libhogweed4-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libnettle-devel-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle-devel-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:libnettle6-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:libnettle6-32bit-3.4.1-4.18.1.x86_64",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.aarch64",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.ppc64le",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.s390x",
"openSUSE Leap 15.3:nettle-3.4.1-4.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T08:40:53Z",
"details": "important"
}
],
"title": "CVE-2021-3580"
}
]
}
OPENSUSE-SU-2024:10962-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libhogweed6-3.7.3-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libhogweed6-3.7.3-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10962",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10962-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16869 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20305 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3580 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3580/"
}
],
"title": "libhogweed6-3.7.3-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10962-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libhogweed6-3.7.3-1.2.aarch64",
"product": {
"name": "libhogweed6-3.7.3-1.2.aarch64",
"product_id": "libhogweed6-3.7.3-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libhogweed6-32bit-3.7.3-1.2.aarch64",
"product": {
"name": "libhogweed6-32bit-3.7.3-1.2.aarch64",
"product_id": "libhogweed6-32bit-3.7.3-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.7.3-1.2.aarch64",
"product": {
"name": "libnettle-devel-3.7.3-1.2.aarch64",
"product_id": "libnettle-devel-3.7.3-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-32bit-3.7.3-1.2.aarch64",
"product": {
"name": "libnettle-devel-32bit-3.7.3-1.2.aarch64",
"product_id": "libnettle-devel-32bit-3.7.3-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libnettle8-3.7.3-1.2.aarch64",
"product": {
"name": "libnettle8-3.7.3-1.2.aarch64",
"product_id": "libnettle8-3.7.3-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libnettle8-32bit-3.7.3-1.2.aarch64",
"product": {
"name": "libnettle8-32bit-3.7.3-1.2.aarch64",
"product_id": "libnettle8-32bit-3.7.3-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "nettle-3.7.3-1.2.aarch64",
"product": {
"name": "nettle-3.7.3-1.2.aarch64",
"product_id": "nettle-3.7.3-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libhogweed6-3.7.3-1.2.ppc64le",
"product": {
"name": "libhogweed6-3.7.3-1.2.ppc64le",
"product_id": "libhogweed6-3.7.3-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libhogweed6-32bit-3.7.3-1.2.ppc64le",
"product": {
"name": "libhogweed6-32bit-3.7.3-1.2.ppc64le",
"product_id": "libhogweed6-32bit-3.7.3-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.7.3-1.2.ppc64le",
"product": {
"name": "libnettle-devel-3.7.3-1.2.ppc64le",
"product_id": "libnettle-devel-3.7.3-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"product": {
"name": "libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"product_id": "libnettle-devel-32bit-3.7.3-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libnettle8-3.7.3-1.2.ppc64le",
"product": {
"name": "libnettle8-3.7.3-1.2.ppc64le",
"product_id": "libnettle8-3.7.3-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libnettle8-32bit-3.7.3-1.2.ppc64le",
"product": {
"name": "libnettle8-32bit-3.7.3-1.2.ppc64le",
"product_id": "libnettle8-32bit-3.7.3-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nettle-3.7.3-1.2.ppc64le",
"product": {
"name": "nettle-3.7.3-1.2.ppc64le",
"product_id": "nettle-3.7.3-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libhogweed6-3.7.3-1.2.s390x",
"product": {
"name": "libhogweed6-3.7.3-1.2.s390x",
"product_id": "libhogweed6-3.7.3-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libhogweed6-32bit-3.7.3-1.2.s390x",
"product": {
"name": "libhogweed6-32bit-3.7.3-1.2.s390x",
"product_id": "libhogweed6-32bit-3.7.3-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.7.3-1.2.s390x",
"product": {
"name": "libnettle-devel-3.7.3-1.2.s390x",
"product_id": "libnettle-devel-3.7.3-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libnettle-devel-32bit-3.7.3-1.2.s390x",
"product": {
"name": "libnettle-devel-32bit-3.7.3-1.2.s390x",
"product_id": "libnettle-devel-32bit-3.7.3-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libnettle8-3.7.3-1.2.s390x",
"product": {
"name": "libnettle8-3.7.3-1.2.s390x",
"product_id": "libnettle8-3.7.3-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libnettle8-32bit-3.7.3-1.2.s390x",
"product": {
"name": "libnettle8-32bit-3.7.3-1.2.s390x",
"product_id": "libnettle8-32bit-3.7.3-1.2.s390x"
}
},
{
"category": "product_version",
"name": "nettle-3.7.3-1.2.s390x",
"product": {
"name": "nettle-3.7.3-1.2.s390x",
"product_id": "nettle-3.7.3-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libhogweed6-3.7.3-1.2.x86_64",
"product": {
"name": "libhogweed6-3.7.3-1.2.x86_64",
"product_id": "libhogweed6-3.7.3-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libhogweed6-32bit-3.7.3-1.2.x86_64",
"product": {
"name": "libhogweed6-32bit-3.7.3-1.2.x86_64",
"product_id": "libhogweed6-32bit-3.7.3-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-3.7.3-1.2.x86_64",
"product": {
"name": "libnettle-devel-3.7.3-1.2.x86_64",
"product_id": "libnettle-devel-3.7.3-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle-devel-32bit-3.7.3-1.2.x86_64",
"product": {
"name": "libnettle-devel-32bit-3.7.3-1.2.x86_64",
"product_id": "libnettle-devel-32bit-3.7.3-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle8-3.7.3-1.2.x86_64",
"product": {
"name": "libnettle8-3.7.3-1.2.x86_64",
"product_id": "libnettle8-3.7.3-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libnettle8-32bit-3.7.3-1.2.x86_64",
"product": {
"name": "libnettle8-32bit-3.7.3-1.2.x86_64",
"product_id": "libnettle8-32bit-3.7.3-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "nettle-3.7.3-1.2.x86_64",
"product": {
"name": "nettle-3.7.3-1.2.x86_64",
"product_id": "nettle-3.7.3-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed6-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64"
},
"product_reference": "libhogweed6-3.7.3-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed6-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le"
},
"product_reference": "libhogweed6-3.7.3-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed6-3.7.3-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x"
},
"product_reference": "libhogweed6-3.7.3-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed6-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64"
},
"product_reference": "libhogweed6-3.7.3-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed6-32bit-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64"
},
"product_reference": "libhogweed6-32bit-3.7.3-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed6-32bit-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le"
},
"product_reference": "libhogweed6-32bit-3.7.3-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed6-32bit-3.7.3-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x"
},
"product_reference": "libhogweed6-32bit-3.7.3-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libhogweed6-32bit-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64"
},
"product_reference": "libhogweed6-32bit-3.7.3-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64"
},
"product_reference": "libnettle-devel-3.7.3-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le"
},
"product_reference": "libnettle-devel-3.7.3-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.7.3-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x"
},
"product_reference": "libnettle-devel-3.7.3-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64"
},
"product_reference": "libnettle-devel-3.7.3-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-32bit-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64"
},
"product_reference": "libnettle-devel-32bit-3.7.3-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-32bit-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le"
},
"product_reference": "libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-32bit-3.7.3-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x"
},
"product_reference": "libnettle-devel-32bit-3.7.3-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle-devel-32bit-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64"
},
"product_reference": "libnettle-devel-32bit-3.7.3-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle8-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64"
},
"product_reference": "libnettle8-3.7.3-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle8-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le"
},
"product_reference": "libnettle8-3.7.3-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle8-3.7.3-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x"
},
"product_reference": "libnettle8-3.7.3-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle8-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64"
},
"product_reference": "libnettle8-3.7.3-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle8-32bit-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64"
},
"product_reference": "libnettle8-32bit-3.7.3-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle8-32bit-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le"
},
"product_reference": "libnettle8-32bit-3.7.3-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle8-32bit-3.7.3-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x"
},
"product_reference": "libnettle8-32bit-3.7.3-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnettle8-32bit-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64"
},
"product_reference": "libnettle8-32bit-3.7.3-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64"
},
"product_reference": "nettle-3.7.3-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le"
},
"product_reference": "nettle-3.7.3-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.7.3-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x"
},
"product_reference": "nettle-3.7.3-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
},
"product_reference": "nettle-3.7.3-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-16869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16869"
}
],
"notes": [
{
"category": "general",
"text": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16869",
"url": "https://www.suse.com/security/cve/CVE-2018-16869"
},
{
"category": "external",
"summary": "SUSE Bug 1117951 for CVE-2018-16869",
"url": "https://bugzilla.suse.com/1117951"
},
{
"category": "external",
"summary": "SUSE Bug 1118086 for CVE-2018-16869",
"url": "https://bugzilla.suse.com/1118086"
},
{
"category": "external",
"summary": "SUSE Bug 1118087 for CVE-2018-16869",
"url": "https://bugzilla.suse.com/1118087"
},
{
"category": "external",
"summary": "SUSE Bug 1134856 for CVE-2018-16869",
"url": "https://bugzilla.suse.com/1134856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16869"
},
{
"cve": "CVE-2021-20305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20305"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20305",
"url": "https://www.suse.com/security/cve/CVE-2021-20305"
},
{
"category": "external",
"summary": "SUSE Bug 1183835 for CVE-2021-20305",
"url": "https://bugzilla.suse.com/1183835"
},
{
"category": "external",
"summary": "SUSE Bug 1184401 for CVE-2021-20305",
"url": "https://bugzilla.suse.com/1184401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-20305"
},
{
"cve": "CVE-2021-3580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3580"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3580",
"url": "https://www.suse.com/security/cve/CVE-2021-3580"
},
{
"category": "external",
"summary": "SUSE Bug 1187060 for CVE-2021-3580",
"url": "https://bugzilla.suse.com/1187060"
},
{
"category": "external",
"summary": "SUSE Bug 1187892 for CVE-2021-3580",
"url": "https://bugzilla.suse.com/1187892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x",
"openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3580"
}
]
}
RHSA-2021:4451
Vulnerability from csaf_redhat - Published: 2021-11-09 18:09 - Updated: 2025-12-03 16:10A flaw was found in nettle in the way its RSA decryption functions handle specially crafted ciphertext. This flaw allows an attacker to provide a manipulated ciphertext, leading to an application crash and a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and denial of service.
CWE-416 - Use After Free| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and denial of service.
CWE-416 - Use After Free| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for gnutls and nettle is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.\n\nNettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.\n\nThe following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)\n\nSecurity Fix(es):\n\n* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)\n\n* gnutls: Use after free in client key_share extension (CVE-2021-20231)\n\n* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4451",
"url": "https://access.redhat.com/errata/RHSA-2021:4451"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1776250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776250"
},
{
"category": "external",
"summary": "1908110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908110"
},
{
"category": "external",
"summary": "1908334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908334"
},
{
"category": "external",
"summary": "1922275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922275"
},
{
"category": "external",
"summary": "1922276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922276"
},
{
"category": "external",
"summary": "1965445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965445"
},
{
"category": "external",
"summary": "1967983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4451.json"
}
],
"title": "Red Hat Security Advisory: gnutls and nettle security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-12-03T16:10:47+00:00",
"generator": {
"date": "2025-12-03T16:10:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2021:4451",
"initial_release_date": "2021-11-09T18:09:57+00:00",
"revision_history": [
{
"date": "2021-11-09T18:09:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:09:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-03T16:10:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.aarch64",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.aarch64",
"product_id": "nettle-devel-0:3.4.1-7.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.aarch64",
"product": {
"name": "nettle-0:3.4.1-7.el8.aarch64",
"product_id": "nettle-0:3.4.1-7.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"product_id": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.ppc64le",
"product": {
"name": "nettle-0:3.4.1-7.el8.ppc64le",
"product_id": "nettle-0:3.4.1-7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.i686",
"product_id": "gnutls-c++-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.i686",
"product_id": "gnutls-dane-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.i686",
"product_id": "gnutls-devel-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-0:3.6.16-4.el8.i686",
"product_id": "gnutls-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.i686",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.i686",
"product_id": "nettle-devel-0:3.4.1-7.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.i686",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.i686",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.i686",
"product": {
"name": "nettle-0:3.4.1-7.el8.i686",
"product_id": "nettle-0:3.4.1-7.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.x86_64",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.x86_64",
"product_id": "nettle-devel-0:3.4.1-7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.x86_64",
"product": {
"name": "nettle-0:3.4.1-7.el8.x86_64",
"product_id": "nettle-0:3.4.1-7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-c++-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-dane-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-devel-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-utils-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-utils-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.s390x",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.s390x",
"product_id": "nettle-devel-0:3.4.1-7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.s390x",
"product": {
"name": "nettle-0:3.4.1-7.el8.s390x",
"product_id": "nettle-0:3.4.1-7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.src",
"product": {
"name": "gnutls-0:3.6.16-4.el8.src",
"product_id": "gnutls-0:3.6.16-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.src",
"product": {
"name": "nettle-0:3.4.1-7.el8.src",
"product_id": "nettle-0:3.4.1-7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src"
},
"product_reference": "gnutls-0:3.6.16-4.el8.src",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src"
},
"product_reference": "nettle-0:3.4.1-7.el8.src",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src"
},
"product_reference": "gnutls-0:3.6.16-4.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src"
},
"product_reference": "nettle-0:3.4.1-7.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the GNU Nettle project"
]
}
],
"cve": "CVE-2021-3580",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1967983"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nettle in the way its RSA decryption functions handle specially crafted ciphertext. This flaw allows an attacker to provide a manipulated ciphertext, leading to an application crash and a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nettle: Remote crash in RSA decryption via manipulated ciphertext",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3580"
},
{
"category": "external",
"summary": "RHBZ#1967983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3580"
}
],
"release_date": "2021-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:09:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4451"
},
{
"category": "workaround",
"details": "As per upstream: For applications that want to support older versions of nettle, the bug can be worked around by adding a check that the RSA ciphertext is in the range 0 \u003c ciphertext \u003c n, before attempting to decrypt it.",
"product_ids": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nettle: Remote crash in RSA decryption via manipulated ciphertext"
},
{
"acknowledgments": [
{
"names": [
"GnuTLS project"
]
}
],
"cve": "CVE-2021-20231",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922276"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Use after free in client key_share extension",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As mentioned in the upstream advisory and GnuTLS issue 1151 (see External References) this flaw is not easily exploitable and it only happens intermittently (denial of service is not always practical). For this reason, this flaw has been rated as having a security impact of Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20231"
},
{
"category": "external",
"summary": "RHBZ#1922276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922276"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20231"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/issues/1151",
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1151"
},
{
"category": "external",
"summary": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10",
"url": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10"
}
],
"release_date": "2021-03-12T09:49:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:09:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4451"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Use after free in client key_share extension"
},
{
"acknowledgments": [
{
"names": [
"GnuTLS project"
]
},
{
"names": [
"Ivan Nikolchev"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-20232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922275"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As mentioned in the upstream advisory and GnuTLS issue 1151 (see External References) this flaw is not easily exploitable and it only happens intermittently (denial of service is not always practical). For this reason, this flaw has been rated as having a security impact of Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20232"
},
{
"category": "external",
"summary": "RHBZ#1922275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20232"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/issues/1151",
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1151"
},
{
"category": "external",
"summary": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10",
"url": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10"
}
],
"release_date": "2021-03-12T09:54:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:09:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4451"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c"
}
]
}
RHSA-2021_4451
Vulnerability from csaf_redhat - Published: 2021-11-09 18:09 - Updated: 2024-11-22 17:12A flaw was found in nettle in the way its RSA decryption functions handle specially crafted ciphertext. This flaw allows an attacker to provide a manipulated ciphertext, leading to an application crash and a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and denial of service.
CWE-416 - Use After Free| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and denial of service.
CWE-416 - Use After Free| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for gnutls and nettle is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.\n\nNettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.\n\nThe following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)\n\nSecurity Fix(es):\n\n* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)\n\n* gnutls: Use after free in client key_share extension (CVE-2021-20231)\n\n* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4451",
"url": "https://access.redhat.com/errata/RHSA-2021:4451"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1776250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776250"
},
{
"category": "external",
"summary": "1908110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908110"
},
{
"category": "external",
"summary": "1908334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908334"
},
{
"category": "external",
"summary": "1922275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922275"
},
{
"category": "external",
"summary": "1922276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922276"
},
{
"category": "external",
"summary": "1965445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965445"
},
{
"category": "external",
"summary": "1967983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4451.json"
}
],
"title": "Red Hat Security Advisory: gnutls and nettle security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T17:12:43+00:00",
"generator": {
"date": "2024-11-22T17:12:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:4451",
"initial_release_date": "2021-11-09T18:09:57+00:00",
"revision_history": [
{
"date": "2021-11-09T18:09:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:09:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:12:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.aarch64",
"product": {
"name": "gnutls-0:3.6.16-4.el8.aarch64",
"product_id": "gnutls-0:3.6.16-4.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.aarch64",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.aarch64",
"product_id": "nettle-devel-0:3.4.1-7.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.aarch64",
"product": {
"name": "nettle-0:3.4.1-7.el8.aarch64",
"product_id": "nettle-0:3.4.1-7.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.ppc64le",
"product": {
"name": "gnutls-0:3.6.16-4.el8.ppc64le",
"product_id": "gnutls-0:3.6.16-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"product_id": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.ppc64le",
"product": {
"name": "nettle-0:3.4.1-7.el8.ppc64le",
"product_id": "nettle-0:3.4.1-7.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.i686",
"product_id": "gnutls-c++-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.i686",
"product_id": "gnutls-dane-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.i686",
"product_id": "gnutls-devel-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.i686",
"product": {
"name": "gnutls-0:3.6.16-4.el8.i686",
"product_id": "gnutls-0:3.6.16-4.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.i686",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.i686",
"product_id": "nettle-devel-0:3.4.1-7.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.i686",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.i686",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.i686",
"product": {
"name": "nettle-0:3.4.1-7.el8.i686",
"product_id": "nettle-0:3.4.1-7.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.x86_64",
"product": {
"name": "gnutls-0:3.6.16-4.el8.x86_64",
"product_id": "gnutls-0:3.6.16-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.x86_64",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.x86_64",
"product_id": "nettle-devel-0:3.4.1-7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.x86_64",
"product": {
"name": "nettle-0:3.4.1-7.el8.x86_64",
"product_id": "nettle-0:3.4.1-7.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-c++-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-c++-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-c++-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-dane-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-dane-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-devel-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-devel-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-devel-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-devel@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-utils-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-utils-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debugsource@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-c%2B%2B-debuginfo@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-dane-debuginfo@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-debuginfo@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls-utils-debuginfo@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.s390x",
"product": {
"name": "gnutls-0:3.6.16-4.el8.s390x",
"product_id": "gnutls-0:3.6.16-4.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nettle-devel-0:3.4.1-7.el8.s390x",
"product": {
"name": "nettle-devel-0:3.4.1-7.el8.s390x",
"product_id": "nettle-devel-0:3.4.1-7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-devel@3.4.1-7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"product": {
"name": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"product_id": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debugsource@3.4.1-7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"product": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"product_id": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle-debuginfo@3.4.1-7.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.s390x",
"product": {
"name": "nettle-0:3.4.1-7.el8.s390x",
"product_id": "nettle-0:3.4.1-7.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gnutls-0:3.6.16-4.el8.src",
"product": {
"name": "gnutls-0:3.6.16-4.el8.src",
"product_id": "gnutls-0:3.6.16-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnutls@3.6.16-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "nettle-0:3.4.1-7.el8.src",
"product": {
"name": "nettle-0:3.4.1-7.el8.src",
"product_id": "nettle-0:3.4.1-7.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src"
},
"product_reference": "gnutls-0:3.6.16-4.el8.src",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src"
},
"product_reference": "nettle-0:3.4.1-7.el8.src",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src"
},
"product_reference": "gnutls-0:3.6.16-4.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-c++-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-dane-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-debugsource-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-devel-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-devel-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-utils-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64"
},
"product_reference": "gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src"
},
"product_reference": "nettle-0:3.4.1-7.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debuginfo-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-debugsource-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-debugsource-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.i686",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nettle-devel-0:3.4.1-7.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
},
"product_reference": "nettle-devel-0:3.4.1-7.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the GNU Nettle project"
]
}
],
"cve": "CVE-2021-3580",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1967983"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nettle in the way its RSA decryption functions handle specially crafted ciphertext. This flaw allows an attacker to provide a manipulated ciphertext, leading to an application crash and a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nettle: Remote crash in RSA decryption via manipulated ciphertext",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3580"
},
{
"category": "external",
"summary": "RHBZ#1967983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3580"
}
],
"release_date": "2021-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:09:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4451"
},
{
"category": "workaround",
"details": "As per upstream: For applications that want to support older versions of nettle, the bug can be worked around by adding a check that the RSA ciphertext is in the range 0 \u003c ciphertext \u003c n, before attempting to decrypt it.",
"product_ids": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nettle: Remote crash in RSA decryption via manipulated ciphertext"
},
{
"acknowledgments": [
{
"names": [
"GnuTLS project"
]
}
],
"cve": "CVE-2021-20231",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922276"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Use after free in client key_share extension",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As mentioned in the upstream advisory and GnuTLS issue 1151 (see External References) this flaw is not easily exploitable and it only happens intermittently (denial of service is not always practical). For this reason, this flaw has been rated as having a security impact of Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20231"
},
{
"category": "external",
"summary": "RHBZ#1922276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922276"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20231"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/issues/1151",
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1151"
},
{
"category": "external",
"summary": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10",
"url": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10"
}
],
"release_date": "2021-03-12T09:49:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:09:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4451"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Use after free in client key_share extension"
},
{
"acknowledgments": [
{
"names": [
"GnuTLS project"
]
},
{
"names": [
"Ivan Nikolchev"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-20232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922275"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As mentioned in the upstream advisory and GnuTLS issue 1151 (see External References) this flaw is not easily exploitable and it only happens intermittently (denial of service is not always practical). For this reason, this flaw has been rated as having a security impact of Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20232"
},
{
"category": "external",
"summary": "RHBZ#1922275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20232"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/issues/1151",
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1151"
},
{
"category": "external",
"summary": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10",
"url": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10"
}
],
"release_date": "2021-03-12T09:54:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:09:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4451"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"AppStream-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"AppStream-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"AppStream-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"AppStream-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.src",
"BaseOS-8.5.0.GA:gnutls-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-c++-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-dane-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-debugsource-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-devel-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.aarch64",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.i686",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.ppc64le",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.s390x",
"BaseOS-8.5.0.GA:gnutls-utils-debuginfo-0:3.6.16-4.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.src",
"BaseOS-8.5.0.GA:nettle-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debuginfo-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-debugsource-0:3.4.1-7.el8.x86_64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.aarch64",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.i686",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.ppc64le",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.s390x",
"BaseOS-8.5.0.GA:nettle-devel-0:3.4.1-7.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c"
}
]
}
VDE-2022-010
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2022-04-12 06:00 - Updated: 2025-05-22 13:03nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
The OPC autogenerated ANSI C stack stubs (in the NodeSets) do not handle all error cases. This can lead to a NULL pointer dereference.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
CWE-125 - Out-of-bounds Read| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions, but might not affect an upstream release.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server ('--ssl-reqd' on the command line or'CURLOPT_USE_SSL' set to 'CURLUSESSL_CONTROL' or 'CURLUSESSL_ALL' withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the 'CURLOPT_SSLCERT' option ('--cert' with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like '/tmp'), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
curl supports the '-t' command line option, known as 'CURLOPT_TELNETOPTIONS'in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending 'NEW_ENV' variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
curl 7.7 through 7.76.1 suffers from an information disclosure when the '-t' command line option, known as 'CURLOPT_TELNETOPTIONS' in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
CWE-909 - Missing Initialization of Resource| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via 'git config --global core.symlinks false'), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — |
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "PLCnext Control AXC F x152 is certified according to IEC 62443-4-1 and IEC 62443-4-2.\nThis certification requires that all third-party components used in the firmware are regularly checked for known vulnerabilities.\n\nFirmware components in version 2021.06 had already been updated. For the 2022.0 LTS version more firmware components have been updated implicitly fixing the vulnerabilities listed. The vulnerabilities listed above have not been individually verified in terms of actual impact and/or limitations in combination with the affected products listed. The current LTS release 2022.0 LTS contains updates of integrated third-party libraries, SDKs and other third-party software to address these issues nevertheless.\n\nUPDATE A (April 4th, 2022): Added RFC 4072 (Art. No. 1051328) and fixed affected version of AXC F 3152 ",
"title": "Summary"
},
{
"category": "description",
"text": "Availability, integrity, or confidentiality of the AXC F x152 might be compromised by attacks using these vulnerabilities. Please consult the CVE-IDs for vulnerability details.",
"title": "Impact"
},
{
"category": "description",
"text": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"title": "Mitigation"
},
{
"category": "description",
"text": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "PHOENIX CONTACT PSIRT ",
"url": "https://phoenixcontact.com/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for PHOENIX CONTACT",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2022-010: PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release - HTML",
"url": "https://certvde.com/en/advisories/VDE-2022-010/"
},
{
"category": "self",
"summary": "VDE-2022-010: PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-010.json"
}
],
"title": "PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release",
"tracking": {
"aliases": [
"VDE-2022-010"
],
"current_release_date": "2025-05-22T13:03:10.000Z",
"generator": {
"date": "2025-04-01T06:28:07.225Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.22"
}
},
"id": "VDE-2022-010",
"initial_release_date": "2022-04-12T06:00:00.000Z",
"revision_history": [
{
"date": "2022-04-12T06:00:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2022-04-28T13:30:00.000Z",
"number": "2",
"summary": "Update A"
},
{
"date": "2025-05-22T13:03:10.000Z",
"number": "3",
"summary": "Fix: added distribution, quotation mark"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AXC F 1152",
"product": {
"name": "AXC F 1152",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 2152",
"product": {
"name": "AXC F 2152",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 3152",
"product": {
"name": "AXC F 3152",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
}
},
{
"category": "product_name",
"name": "RFC 4072",
"product": {
"name": "RFC 4072",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2022.0.3 LTS",
"product": {
"name": "Firmware \u003c2022.0.3 LTS",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version_range",
"name": "\u003c2022.0.5 LTS",
"product": {
"name": "Firmware \u003c2022.0.5 LTS",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version",
"name": "2022.0.3 LTS",
"product": {
"name": "Firmware 2022.0.3 LTS",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version",
"name": "2022.0.5 LTS",
"product": {
"name": "Firmware 2022.0.5 LTS",
"product_id": "CSAFPID-22002"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
],
"summary": "Affected Products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"summary": "Fixed Products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.3 LTS installed on AXC F 1152",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.3 LTS installed on AXC F 2152",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.5 LTS installed on AXC F 3152",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.5 LTS installed on RFC 4072",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.3 LTS installed on AXC F 1152",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.3 LTS installed on AXC F 2152",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.5 LTS installed on AXC F 3152",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.5 LTS installed on RFC 4072",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11004"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-22826",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22826"
},
{
"cve": "CVE-2022-22825",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22825"
},
{
"cve": "CVE-2022-22824",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-22823",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22822",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2021-45117",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "The OPC autogenerated ANSI C stack stubs (in the NodeSets) do not handle all error cases. This can lead to a NULL pointer dereference.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-45117"
},
{
"cve": "CVE-2021-45960",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"notes": [
{
"category": "description",
"text": "In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-45960"
},
{
"cve": "CVE-2020-15078",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "description",
"text": "OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-15078"
},
{
"cve": "CVE-2021-3518",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3518"
},
{
"cve": "CVE-2019-18276",
"cwe": {
"id": "CWE-273",
"name": "Improper Check for Dropped Privileges"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support \"saved UID\" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use \"enable -f\" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-18276"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-46143",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-46143"
},
{
"cve": "CVE-2022-23852",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-22827",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22827"
},
{
"cve": "CVE-2022-23990",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-23990"
},
{
"cve": "CVE-2021-3712",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.4,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.4,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-3711",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "description",
"text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-41990",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-41990"
},
{
"cve": "CVE-2020-10878",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"environmentalScore": 8.6,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.6,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-10878"
},
{
"cve": "CVE-2021-45079",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-45079"
},
{
"cve": "CVE-2016-20012",
"notes": [
{
"category": "description",
"text": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2016-20012"
},
{
"cve": "CVE-2021-3580",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3580"
},
{
"cve": "CVE-2021-20305",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-20305"
},
{
"cve": "CVE-2021-40330",
"notes": [
{
"category": "description",
"text": "git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-40330"
},
{
"cve": "CVE-2021-35942",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-35942"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2020-6096",
"cwe": {
"id": "CWE-195",
"name": "Signed to Unsigned Conversion Error"
},
"notes": [
{
"category": "description",
"text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-6096"
},
{
"cve": "CVE-2020-29562",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "description",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.8,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.8,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2021-20231",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-20231"
},
{
"cve": "CVE-2021-20232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-20232"
},
{
"cve": "CVE-2020-24659",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application\u0027s error handling path, where the gnutls_deinit function is called after detecting a handshake failure.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-24659"
},
{
"cve": "CVE-2019-17498",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-17498"
},
{
"cve": "CVE-2021-3517",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"environmentalScore": 8.6,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.6,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3517"
},
{
"cve": "CVE-2021-3537",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3537"
},
{
"cve": "CVE-2020-10543",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 8.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-10543"
},
{
"cve": "CVE-2020-12723",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "description",
"text": "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-12723"
},
{
"cve": "CVE-2021-20193",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 3.3,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.3,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-20193"
},
{
"cve": "CVE-2019-20892",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "description",
"text": "net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions, but might not affect an upstream release.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2021-43618",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-43618"
},
{
"cve": "CVE-2019-20907",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "description",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2021-22946",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "description",
"text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (\u0027--ssl-reqd\u0027 on the command line or\u0027CURLOPT_USE_SSL\u0027 set to \u0027CURLUSESSL_CONTROL\u0027 or \u0027CURLUSESSL_ALL\u0027 withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2020-8169",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2021-22926",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "description",
"text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the \u0027CURLOPT_SSLCERT\u0027 option (\u0027--cert\u0027 with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like \u0027/tmp\u0027), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-23017",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "description",
"text": "A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.7,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.7,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-23017"
},
{
"cve": "CVE-2020-8177",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2018-1000500",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "description",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2021-22922",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "description",
"text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22947",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "description",
"text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-22897",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "description",
"text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22925",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "description",
"text": "curl supports the \u0027-t\u0027 command line option, known as \u0027CURLOPT_TELNETOPTIONS\u0027in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending \u0027NEW_ENV\u0027 variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22923",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "description",
"text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22898",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "description",
"text": "curl 7.7 through 7.76.1 suffers from an information disclosure when the \u0027-t\u0027 command line option, known as \u0027CURLOPT_TELNETOPTIONS\u0027 in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"environmentalScore": 3.1,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.1,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-21300",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "description",
"text": "Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via \u0027git config --global core.symlinks false\u0027), the described attack won\u0027t work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-21300"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42380"
}
]
}
CERTFR-2022-AVI-386
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM QRadar SIEM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.5.0 antérieure à 7.5.0 UP1 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.3 antérieures à 7.4.3 FP5 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.3 antérieures à 7.3.3 FP11 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM version 7.5.0 ant\u00e9rieure \u00e0 7.5.0 UP1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.4.3 ant\u00e9rieures \u00e0 7.4.3 FP5",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.3.3 ant\u00e9rieures \u00e0 7.3.3 FP11",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3200"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2020-8022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8022"
},
{
"name": "CVE-2021-38919",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38919"
},
{
"name": "CVE-2021-42340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
},
{
"name": "CVE-2021-33929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33929"
},
{
"name": "CVE-2021-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20231"
},
{
"name": "CVE-2021-38939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38939"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2021-38874",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38874"
},
{
"name": "CVE-2021-41182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
},
{
"name": "CVE-2021-33928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33928"
},
{
"name": "CVE-2021-36086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36086"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2019-17594",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17594"
},
{
"name": "CVE-2021-38869",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38869"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-9488",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9488"
},
{
"name": "CVE-2020-24370",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24370"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2021-41184",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
},
{
"name": "CVE-2021-33813",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33813"
},
{
"name": "CVE-2021-41183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
},
{
"name": "CVE-2021-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3445"
},
{
"name": "CVE-2020-16135",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16135"
},
{
"name": "CVE-2021-36085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36085"
},
{
"name": "CVE-2021-29776",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29776"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2019-17595",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17595"
},
{
"name": "CVE-2021-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23214"
},
{
"name": "CVE-2021-33930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33930"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2021-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20232"
},
{
"name": "CVE-2021-28153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28153"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22345"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-38878",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38878"
},
{
"name": "CVE-2021-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36087"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-22096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22096"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2021-36084",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36084"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"name": "CVE-2021-33938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33938"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-386",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar SIEM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar SIEM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6574453 du 25 avril 2022",
"url": "https://www.ibm.com/support/pages/node/6574453"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6574787 du 25 avril 2022",
"url": "https://www.ibm.com/support/pages/node/6574787"
}
]
}
CERTFR-2023-AVI-1015
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions | ||
| Siemens | N/A | SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC CP 1243-7 LTE toutes versions | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SINAMICS S210 (6SL5...) versions supérieures ou égales àV6.1 versions antérieures à V6.1 HF2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions | ||
| Siemens | N/A | SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP01-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | LOGO! 230RCEo (6ED1052-2FB08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | LOGO! 230RCE (6ED1052-1FB08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | LOGO! 12/24RCE (6ED1052-1MD08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions antérieures à V8.0 | ||
| Siemens | N/A | Opcenter Quality toutes versions | ||
| Siemens | N/A | SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE S615 (6GK5615-0AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | LOGO! 24CE (6ED1052-1CC08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions antérieures à V8.0 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | LOGO! 24CEo (6ED1052-2CC08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions | ||
| Siemens | N/A | SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SINEC INS versions antérieures à V1.0 SP2 Update 2 | ||
| Siemens | N/A | SIMATIC PC-Station Plus toutes versions | ||
| Siemens | N/A | SINAMICS S210 (6SL5...) versions supérieures à V6.1 et antérieure à V6.1 HF2 | ||
| Siemens | N/A | SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC PCS neo versions antérieures à V4.1 | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions | ||
| Siemens | N/A | SINUMERIK ONE toutes versions | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions | ||
| Siemens | N/A | SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions | ||
| Siemens | N/A | SINUMERIK MC toutes versions | ||
| Siemens | N/A | SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) versions antérieures à V2.60 | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SINAMICS S120 (incl. SIPLUS variants) versions antérieures à V5.2 SP3 HF15 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) versions V14 à V18 antérieures à V18 Update 3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions antérieures à V8.0 | ||
| Siemens | N/A | SCALANCE S615 (6GK5615-0AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions antérieures à V8.0 | ||
| Siemens | N/A | POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) versions antérieures à V2.60 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions antérieures à V8.0 | ||
| Siemens | N/A | LOGO! 24RCE (6ED1052-1HB08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC STEP 7 (TIA Portal) versions antérieures à V19 | ||
| Siemens | N/A | LOGO! 24RCEo (6ED1052-2HB08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SINUMERIK Integrate RunMyHMI /Automotive toutes versions | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM Advanced versions antérieures à V6.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE S615 EEC (6GK5615-0AA01-2AA2) toutes versions | ||
| Siemens | N/A | SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC CP 1243-1 (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions | ||
| Siemens | N/A | SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-7 LTE toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S210 (6SL5...) versions sup\u00e9rieures ou \u00e9gales \u00e0V6.1 versions ant\u00e9rieures \u00e0 V6.1 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP01-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 230RCEo (6ED1052-2FB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 230RCE (6ED1052-1FB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 12/24RCE (6ED1052-1MD08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Opcenter Quality toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 24CE (6ED1052-1CC08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 24CEo (6ED1052-2CC08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC INS versions ant\u00e9rieures \u00e0 V1.0 SP2 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PC-Station Plus toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S210 (6SL5...) versions sup\u00e9rieures \u00e0 V6.1 et ant\u00e9rieure \u00e0 V6.1 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK ONE toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK MC toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) versions ant\u00e9rieures \u00e0 V2.60",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S120 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V5.2 SP3 HF15",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) versions V14 \u00e0 V18 ant\u00e9rieures \u00e0 V18 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) versions ant\u00e9rieures \u00e0 V2.60",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 24RCE (6ED1052-1HB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 (TIA Portal) versions ant\u00e9rieures \u00e0 V19",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 24RCEo (6ED1052-2HB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK Integrate RunMyHMI /Automotive toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM Advanced versions ant\u00e9rieures \u00e0 V6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-1 (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-0663",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0663"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2017-9048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9048"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2017-9050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9050"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-9049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9049"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2019-6111",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6111"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2019-6109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6109"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-3859",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3859"
},
{
"name": "CVE-2019-3861",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3861"
},
{
"name": "CVE-2019-3860",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3860"
},
{
"name": "CVE-2019-3858",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3858"
},
{
"name": "CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"name": "CVE-2019-13565",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
},
{
"name": "CVE-2019-13057",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-16168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16168"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2019-5018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5018"
},
{
"name": "CVE-2019-9936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9936"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2020-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7595"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2019-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9937"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2020-25709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2019-19956",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19956"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2021-28363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28363"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2019-17543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17543"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2019-19645",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2019-20388",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20388"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2019-6110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6110"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2019-16905",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16905"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46143"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2019-5436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5436"
},
{
"name": "CVE-2022-25313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25313"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2019-19603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2019-17594",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17594"
},
{
"name": "CVE-2019-17595",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17595"
},
{
"name": "CVE-2021-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20231"
},
{
"name": "CVE-2021-36085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36085"
},
{
"name": "CVE-2021-36084",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36084"
},
{
"name": "CVE-2021-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20232"
},
{
"name": "CVE-2021-36086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36086"
},
{
"name": "CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"name": "CVE-2021-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36087"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2021-28153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28153"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2022-25314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2020-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2018-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2022-27778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2019-18348",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18348"
},
{
"name": "CVE-2020-15523",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15523"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2023-25136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25136"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2018-12886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2023-31238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31238"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-30901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30901"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2019-20218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20218"
},
{
"name": "CVE-2020-35527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35527"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2019-19959",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19959"
},
{
"name": "CVE-2020-35525",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35525"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2016-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3709"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-34319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34319"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2023-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28831"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2023-39192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39192"
},
{
"name": "CVE-2023-39193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39193"
},
{
"name": "CVE-2023-42754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42754"
},
{
"name": "CVE-2023-39194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39194"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-42755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42755"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39189"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-44321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44321"
},
{
"name": "CVE-2023-44374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44374"
},
{
"name": "CVE-2023-44320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
},
{
"name": "CVE-2023-44319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
},
{
"name": "CVE-2023-44317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
},
{
"name": "CVE-2023-44318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44318"
},
{
"name": "CVE-2023-44373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
},
{
"name": "CVE-2023-44322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44322"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2020-19186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19186"
},
{
"name": "CVE-2020-19190",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19190"
},
{
"name": "CVE-2020-19185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19185"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2020-19187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19187"
},
{
"name": "CVE-2020-19188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19188"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2019-11360",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11360"
},
{
"name": "CVE-2019-13627",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13627"
},
{
"name": "CVE-2019-7309",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7309"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2019-1010024",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
},
{
"name": "CVE-2022-47375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47375"
},
{
"name": "CVE-2019-19126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19126"
},
{
"name": "CVE-2023-46283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46283"
},
{
"name": "CVE-2023-46282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46282"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2014-7209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7209"
},
{
"name": "CVE-2023-48431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48431"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2017-17512",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17512"
},
{
"name": "CVE-2020-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1712"
},
{
"name": "CVE-2023-48430",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48430"
},
{
"name": "CVE-2019-6488",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6488"
},
{
"name": "CVE-2023-39128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39128"
},
{
"name": "CVE-2018-20482",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20482"
},
{
"name": "CVE-2021-27212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2019-20795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20795"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-9674",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9674"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2020-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21913"
},
{
"name": "CVE-2019-12904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12904"
},
{
"name": "CVE-2021-28041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28041"
},
{
"name": "CVE-2022-42784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42784"
},
{
"name": "CVE-2023-48427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48427"
},
{
"name": "CVE-2020-24659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24659"
},
{
"name": "CVE-2023-48429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48429"
},
{
"name": "CVE-2020-12062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12062"
},
{
"name": "CVE-2019-1010023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
},
{
"name": "CVE-2023-49692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49692"
},
{
"name": "CVE-2016-10739",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10739"
},
{
"name": "CVE-2019-1010180",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010180"
},
{
"name": "CVE-2023-46285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46285"
},
{
"name": "CVE-2023-46156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46156"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2019-15847",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15847"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2019-20367",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20367"
},
{
"name": "CVE-2023-46284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46284"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2019-1010022",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
},
{
"name": "CVE-2020-6096",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6096"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-48428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48428"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2023-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49691"
},
{
"name": "CVE-2023-25139",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25139"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2020-1751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1751"
},
{
"name": "CVE-2019-1010025",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
},
{
"name": "CVE-2019-12290",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12290"
},
{
"name": "CVE-2019-18224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18224"
},
{
"name": "CVE-2018-18928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18928"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2020-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21047"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2023-38380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38380"
},
{
"name": "CVE-2023-28531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28531"
},
{
"name": "CVE-2020-11501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11501"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2022-47374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47374"
},
{
"name": "CVE-2023-46281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46281"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2020-15801",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15801"
},
{
"name": "CVE-2022-46141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46141"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-13529",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13529"
},
{
"name": "CVE-2023-27371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27371"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2019-9923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9923"
},
{
"name": "CVE-2020-13777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13777"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2020-14422",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14422"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2021-4209",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4209"
},
{
"name": "CVE-2018-19591",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19591"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-1015",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-12-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-844582 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-180704 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-480095.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-077170 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-999588.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-480095 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-118850 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-118850.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-068047 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-077170.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-892915 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-280603.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-999588 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-280603 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-693975.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693975 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-892915.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-887801 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-887801.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-592380 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-844582.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-398330 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-592380.html"
}
]
}
CERTFR-2023-AVI-1015
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions | ||
| Siemens | N/A | SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC CP 1243-7 LTE toutes versions | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SINAMICS S210 (6SL5...) versions supérieures ou égales àV6.1 versions antérieures à V6.1 HF2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions | ||
| Siemens | N/A | SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP01-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | LOGO! 230RCEo (6ED1052-2FB08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | LOGO! 230RCE (6ED1052-1FB08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | LOGO! 12/24RCE (6ED1052-1MD08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions antérieures à V8.0 | ||
| Siemens | N/A | Opcenter Quality toutes versions | ||
| Siemens | N/A | SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE S615 (6GK5615-0AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | LOGO! 24CE (6ED1052-1CC08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions antérieures à V8.0 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | LOGO! 24CEo (6ED1052-2CC08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions | ||
| Siemens | N/A | SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SINEC INS versions antérieures à V1.0 SP2 Update 2 | ||
| Siemens | N/A | SIMATIC PC-Station Plus toutes versions | ||
| Siemens | N/A | SINAMICS S210 (6SL5...) versions supérieures à V6.1 et antérieure à V6.1 HF2 | ||
| Siemens | N/A | SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC PCS neo versions antérieures à V4.1 | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions | ||
| Siemens | N/A | SINUMERIK ONE toutes versions | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions | ||
| Siemens | N/A | SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions | ||
| Siemens | N/A | SINUMERIK MC toutes versions | ||
| Siemens | N/A | SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) versions antérieures à V2.60 | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SINAMICS S120 (incl. SIPLUS variants) versions antérieures à V5.2 SP3 HF15 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) versions V14 à V18 antérieures à V18 Update 3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions antérieures à V8.0 | ||
| Siemens | N/A | SCALANCE S615 (6GK5615-0AA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions antérieures à V8.0 | ||
| Siemens | N/A | POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) versions antérieures à V2.60 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions antérieures à V8.0 | ||
| Siemens | N/A | LOGO! 24RCE (6ED1052-1HB08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC STEP 7 (TIA Portal) versions antérieures à V19 | ||
| Siemens | N/A | LOGO! 24RCEo (6ED1052-2HB08-0BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SINUMERIK Integrate RunMyHMI /Automotive toutes versions | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-PLCSIM Advanced versions antérieures à V6.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SCALANCE S615 EEC (6GK5615-0AA01-2AA2) toutes versions | ||
| Siemens | N/A | SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) toutes versions supérieures ou égales à V8.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC CP 1243-1 (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions antérieures à V7.2.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CM03-0AB0) versions antérieures à V3.1.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions antérieures à V8.0 | ||
| Siemens | N/A | SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions | ||
| Siemens | N/A | SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-7 LTE toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S210 (6SL5...) versions sup\u00e9rieures ou \u00e9gales \u00e0V6.1 versions ant\u00e9rieures \u00e0 V6.1 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP01-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 230RCEo (6ED1052-2FB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 230RCE (6ED1052-1FB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 12/24RCE (6ED1052-1MD08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Opcenter Quality toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 24CE (6ED1052-1CC08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 24CEo (6ED1052-2CC08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC INS versions ant\u00e9rieures \u00e0 V1.0 SP2 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PC-Station Plus toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S210 (6SL5...) versions sup\u00e9rieures \u00e0 V6.1 et ant\u00e9rieure \u00e0 V6.1 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK ONE toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK MC toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) versions ant\u00e9rieures \u00e0 V2.60",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S120 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V5.2 SP3 HF15",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) versions V14 \u00e0 V18 ant\u00e9rieures \u00e0 V18 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) versions ant\u00e9rieures \u00e0 V2.60",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 24RCE (6ED1052-1HB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 (TIA Portal) versions ant\u00e9rieures \u00e0 V19",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO! 24RCEo (6ED1052-2HB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK Integrate RunMyHMI /Automotive toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM Advanced versions ant\u00e9rieures \u00e0 V6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-1 (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-0663",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0663"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2017-9048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9048"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2017-9050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9050"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-9049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9049"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2019-6111",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6111"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2019-6109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6109"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-3859",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3859"
},
{
"name": "CVE-2019-3861",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3861"
},
{
"name": "CVE-2019-3860",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3860"
},
{
"name": "CVE-2019-3858",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3858"
},
{
"name": "CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"name": "CVE-2019-13565",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
},
{
"name": "CVE-2019-13057",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-16168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16168"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2019-5018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5018"
},
{
"name": "CVE-2019-9936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9936"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2020-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7595"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2019-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9937"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2020-25709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2019-19956",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19956"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2021-28363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28363"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2019-17543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17543"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2019-19645",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2019-20388",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20388"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2019-6110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6110"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2019-16905",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16905"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46143"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2019-5436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5436"
},
{
"name": "CVE-2022-25313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25313"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2019-19603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2019-17594",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17594"
},
{
"name": "CVE-2019-17595",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17595"
},
{
"name": "CVE-2021-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20231"
},
{
"name": "CVE-2021-36085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36085"
},
{
"name": "CVE-2021-36084",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36084"
},
{
"name": "CVE-2021-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20232"
},
{
"name": "CVE-2021-36086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36086"
},
{
"name": "CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"name": "CVE-2021-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36087"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2021-28153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28153"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2022-25314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2020-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2018-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2022-27778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2019-18348",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18348"
},
{
"name": "CVE-2020-15523",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15523"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2023-25136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25136"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2018-12886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2023-31238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31238"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-30901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30901"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2019-20218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20218"
},
{
"name": "CVE-2020-35527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35527"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2019-19959",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19959"
},
{
"name": "CVE-2020-35525",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35525"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2016-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3709"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-34319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34319"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2023-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28831"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2023-39192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39192"
},
{
"name": "CVE-2023-39193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39193"
},
{
"name": "CVE-2023-42754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42754"
},
{
"name": "CVE-2023-39194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39194"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-42755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42755"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39189"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-44321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44321"
},
{
"name": "CVE-2023-44374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44374"
},
{
"name": "CVE-2023-44320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
},
{
"name": "CVE-2023-44319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
},
{
"name": "CVE-2023-44317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
},
{
"name": "CVE-2023-44318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44318"
},
{
"name": "CVE-2023-44373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
},
{
"name": "CVE-2023-44322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44322"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2020-19186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19186"
},
{
"name": "CVE-2020-19190",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19190"
},
{
"name": "CVE-2020-19185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19185"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2020-19187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19187"
},
{
"name": "CVE-2020-19188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19188"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2019-11360",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11360"
},
{
"name": "CVE-2019-13627",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13627"
},
{
"name": "CVE-2019-7309",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7309"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2019-1010024",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
},
{
"name": "CVE-2022-47375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47375"
},
{
"name": "CVE-2019-19126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19126"
},
{
"name": "CVE-2023-46283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46283"
},
{
"name": "CVE-2023-46282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46282"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2014-7209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7209"
},
{
"name": "CVE-2023-48431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48431"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2017-17512",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17512"
},
{
"name": "CVE-2020-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1712"
},
{
"name": "CVE-2023-48430",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48430"
},
{
"name": "CVE-2019-6488",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6488"
},
{
"name": "CVE-2023-39128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39128"
},
{
"name": "CVE-2018-20482",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20482"
},
{
"name": "CVE-2021-27212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2019-20795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20795"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-9674",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9674"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2020-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21913"
},
{
"name": "CVE-2019-12904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12904"
},
{
"name": "CVE-2021-28041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28041"
},
{
"name": "CVE-2022-42784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42784"
},
{
"name": "CVE-2023-48427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48427"
},
{
"name": "CVE-2020-24659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24659"
},
{
"name": "CVE-2023-48429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48429"
},
{
"name": "CVE-2020-12062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12062"
},
{
"name": "CVE-2019-1010023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
},
{
"name": "CVE-2023-49692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49692"
},
{
"name": "CVE-2016-10739",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10739"
},
{
"name": "CVE-2019-1010180",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010180"
},
{
"name": "CVE-2023-46285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46285"
},
{
"name": "CVE-2023-46156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46156"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2019-15847",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15847"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2019-20367",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20367"
},
{
"name": "CVE-2023-46284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46284"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2019-1010022",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
},
{
"name": "CVE-2020-6096",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6096"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-48428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48428"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2023-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49691"
},
{
"name": "CVE-2023-25139",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25139"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2020-1751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1751"
},
{
"name": "CVE-2019-1010025",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
},
{
"name": "CVE-2019-12290",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12290"
},
{
"name": "CVE-2019-18224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18224"
},
{
"name": "CVE-2018-18928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18928"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2020-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21047"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2023-38380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38380"
},
{
"name": "CVE-2023-28531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28531"
},
{
"name": "CVE-2020-11501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11501"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2022-47374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47374"
},
{
"name": "CVE-2023-46281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46281"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2020-15801",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15801"
},
{
"name": "CVE-2022-46141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46141"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-13529",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13529"
},
{
"name": "CVE-2023-27371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27371"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2019-9923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9923"
},
{
"name": "CVE-2020-13777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13777"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2020-14422",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14422"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2021-4209",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4209"
},
{
"name": "CVE-2018-19591",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19591"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-1015",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-12-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-844582 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-180704 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-480095.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-077170 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-999588.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-480095 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-118850 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-118850.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-068047 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-077170.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-892915 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-280603.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-999588 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-280603 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-693975.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693975 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-892915.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-887801 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-887801.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-592380 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-844582.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-398330 du 12 d\u00e9cembre 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-592380.html"
}
]
}
CERTFR-2022-AVI-386
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM QRadar SIEM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.5.0 antérieure à 7.5.0 UP1 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.3 antérieures à 7.4.3 FP5 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.3 antérieures à 7.3.3 FP11 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM version 7.5.0 ant\u00e9rieure \u00e0 7.5.0 UP1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.4.3 ant\u00e9rieures \u00e0 7.4.3 FP5",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.3.3 ant\u00e9rieures \u00e0 7.3.3 FP11",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3200"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2020-8022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8022"
},
{
"name": "CVE-2021-38919",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38919"
},
{
"name": "CVE-2021-42340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
},
{
"name": "CVE-2021-33929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33929"
},
{
"name": "CVE-2021-20231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20231"
},
{
"name": "CVE-2021-38939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38939"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2021-38874",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38874"
},
{
"name": "CVE-2021-41182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
},
{
"name": "CVE-2021-33928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33928"
},
{
"name": "CVE-2021-36086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36086"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2019-17594",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17594"
},
{
"name": "CVE-2021-38869",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38869"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-9488",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9488"
},
{
"name": "CVE-2020-24370",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24370"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2021-41184",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
},
{
"name": "CVE-2021-33813",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33813"
},
{
"name": "CVE-2021-41183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
},
{
"name": "CVE-2021-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3445"
},
{
"name": "CVE-2020-16135",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16135"
},
{
"name": "CVE-2021-36085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36085"
},
{
"name": "CVE-2021-29776",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29776"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2019-17595",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17595"
},
{
"name": "CVE-2021-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23214"
},
{
"name": "CVE-2021-33930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33930"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2021-20232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20232"
},
{
"name": "CVE-2021-28153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28153"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22345"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-38878",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38878"
},
{
"name": "CVE-2021-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36087"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-22096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22096"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2021-36084",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36084"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"name": "CVE-2021-33938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33938"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-386",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar SIEM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar SIEM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6574453 du 25 avril 2022",
"url": "https://www.ibm.com/support/pages/node/6574453"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6574787 du 25 avril 2022",
"url": "https://www.ibm.com/support/pages/node/6574787"
}
]
}
CERTFR-2024-AVI-0380
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits NetApp. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| NetApp | ONTAP Select Deploy administration utility | ONTAP Select Deploy administration utility versions antérieures à 9.14.1 | ||
| NetApp | Active IQ Unified Manager pour Microsoft Windows | Active IQ Unified Manager pour Microsoft Windows versions antérieures à 9.12 | ||
| NetApp | Active IQ Unified Manager pour VMware vSphere | Active IQ Unified Manager pour VMware vSphere versions antérieures à 9.10 | ||
| NetApp | N/A | NetApp Cloud Backup toutes versions | ||
| NetApp | NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S | NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S et H410C toutes versions |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ONTAP Select Deploy administration utility versions ant\u00e9rieures \u00e0 9.14.1",
"product": {
"name": "ONTAP Select Deploy administration utility",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "Active IQ Unified Manager pour Microsoft Windows versions ant\u00e9rieures \u00e0 9.12",
"product": {
"name": "Active IQ Unified Manager pour Microsoft Windows",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "Active IQ Unified Manager pour VMware vSphere versions ant\u00e9rieures \u00e0 9.10",
"product": {
"name": "Active IQ Unified Manager pour VMware vSphere",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "NetApp Cloud Backup toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S et H410C toutes versions",
"product": {
"name": "NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S",
"vendor": {
"name": "NetApp",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3631"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2021-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4090"
},
{
"name": "CVE-2021-3667",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3667"
},
{
"name": "CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0380",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits NetApp\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits NetApp",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20220331-0005 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20220331-0005/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20220331-0010 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20220331-0010/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20220318-0010 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20220318-0010/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20220419-0005 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20220419-0005/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20211104-0006 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20211104-0006/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20211104-0005 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20211104-0005/"
}
]
}
CERTFR-2024-AVI-0380
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits NetApp. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| NetApp | ONTAP Select Deploy administration utility | ONTAP Select Deploy administration utility versions antérieures à 9.14.1 | ||
| NetApp | Active IQ Unified Manager pour Microsoft Windows | Active IQ Unified Manager pour Microsoft Windows versions antérieures à 9.12 | ||
| NetApp | Active IQ Unified Manager pour VMware vSphere | Active IQ Unified Manager pour VMware vSphere versions antérieures à 9.10 | ||
| NetApp | N/A | NetApp Cloud Backup toutes versions | ||
| NetApp | NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S | NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S et H410C toutes versions |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ONTAP Select Deploy administration utility versions ant\u00e9rieures \u00e0 9.14.1",
"product": {
"name": "ONTAP Select Deploy administration utility",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "Active IQ Unified Manager pour Microsoft Windows versions ant\u00e9rieures \u00e0 9.12",
"product": {
"name": "Active IQ Unified Manager pour Microsoft Windows",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "Active IQ Unified Manager pour VMware vSphere versions ant\u00e9rieures \u00e0 9.10",
"product": {
"name": "Active IQ Unified Manager pour VMware vSphere",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "NetApp Cloud Backup toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S et H410C toutes versions",
"product": {
"name": "NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S",
"vendor": {
"name": "NetApp",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3631"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2021-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4090"
},
{
"name": "CVE-2021-3667",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3667"
},
{
"name": "CVE-2021-3580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0380",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits NetApp\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits NetApp",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20220331-0005 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20220331-0005/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20220331-0010 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20220331-0010/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20220318-0010 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20220318-0010/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20220419-0005 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20220419-0005/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20211104-0006 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20211104-0006/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20211104-0005 du 09 mai 2024",
"url": "https://security.netapp.com/advisory/ntap-20211104-0005/"
}
]
}
FKIE_CVE-2021-3580
Vulnerability from fkie_nvd - Published: 2021-08-05 21:15 - Updated: 2024-11-21 06:21| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1967983 | Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | https://security.gentoo.org/glsa/202401-24 | ||
| secalert@redhat.com | https://security.netapp.com/advisory/ntap-20211104-0006/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1967983 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202401-24 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20211104-0006/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| nettle_project | nettle | * | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| netapp | ontap_select_deploy_administration_utility | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F76873D4-2279-47A8-BE90-A69BB90294CB",
"versionEndExcluding": "3.7.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service."
},
{
"lang": "es",
"value": "Se ha encontrado un fallo en la manera en que las funciones de descifrado RSA de Nettle manejan el texto cifrado especialmente dise\u00f1ado. Un atacante podr\u00eda usar este fallo para proporcionar un texto cifrado manipulado, conllevando al bloqueo de la aplicaci\u00f3n y la denegaci\u00f3n de servicio"
}
],
"id": "CVE-2021-3580",
"lastModified": "2024-11-21T06:21:53.797",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-05T21:15:12.853",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html"
},
{
"source": "secalert@redhat.com",
"url": "https://security.gentoo.org/glsa/202401-24"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211104-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202401-24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211104-0006/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
ICSA-23-348-10
Vulnerability from csaf_cisa - Published: 2023-12-12 00:00 - Updated: 2025-08-12 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|
6ES7518-4FX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)
|
6ES7518-4FX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
Siemens / SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)
|
6AG1518-4AX00-4AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)
|
6ES7518-4AX00-1AB0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
Siemens / SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)
|
6ES7518-4AX00-1AC0
|
vers:intdot/>=3.1.0|<3.1.5 |
Mitigation
Vendor Fix
fix
|
|
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
Siemens / SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)
|