Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-11053 (GCVE-0-2024-11053)
Vulnerability from cvelistv5
| URL | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| curl | curl |
Version: 8.11.0 ≤ 8.11.0 Version: 8.10.1 ≤ 8.10.1 Version: 8.10.0 ≤ 8.10.0 Version: 8.9.1 ≤ 8.9.1 Version: 8.9.0 ≤ 8.9.0 Version: 8.8.0 ≤ 8.8.0 Version: 8.7.1 ≤ 8.7.1 Version: 8.7.0 ≤ 8.7.0 Version: 8.6.0 ≤ 8.6.0 Version: 8.5.0 ≤ 8.5.0 Version: 8.4.0 ≤ 8.4.0 Version: 8.3.0 ≤ 8.3.0 Version: 8.2.1 ≤ 8.2.1 Version: 8.2.0 ≤ 8.2.0 Version: 8.1.2 ≤ 8.1.2 Version: 8.1.1 ≤ 8.1.1 Version: 8.1.0 ≤ 8.1.0 Version: 8.0.1 ≤ 8.0.1 Version: 8.0.0 ≤ 8.0.0 Version: 7.88.1 ≤ 7.88.1 Version: 7.88.0 ≤ 7.88.0 Version: 7.87.0 ≤ 7.87.0 Version: 7.86.0 ≤ 7.86.0 Version: 7.85.0 ≤ 7.85.0 Version: 7.84.0 ≤ 7.84.0 Version: 7.83.1 ≤ 7.83.1 Version: 7.83.0 ≤ 7.83.0 Version: 7.82.0 ≤ 7.82.0 Version: 7.81.0 ≤ 7.81.0 Version: 7.80.0 ≤ 7.80.0 Version: 7.79.1 ≤ 7.79.1 Version: 7.79.0 ≤ 7.79.0 Version: 7.78.0 ≤ 7.78.0 Version: 7.77.0 ≤ 7.77.0 Version: 7.76.1 ≤ 7.76.1 Version: 7.76.0 ≤ 7.76.0 Version: 7.75.0 ≤ 7.75.0 Version: 7.74.0 ≤ 7.74.0 Version: 7.73.0 ≤ 7.73.0 Version: 7.72.0 ≤ 7.72.0 Version: 7.71.1 ≤ 7.71.1 Version: 7.71.0 ≤ 7.71.0 Version: 7.70.0 ≤ 7.70.0 Version: 7.69.1 ≤ 7.69.1 Version: 7.69.0 ≤ 7.69.0 Version: 7.68.0 ≤ 7.68.0 Version: 7.67.0 ≤ 7.67.0 Version: 7.66.0 ≤ 7.66.0 Version: 7.65.3 ≤ 7.65.3 Version: 7.65.2 ≤ 7.65.2 Version: 7.65.1 ≤ 7.65.1 Version: 7.65.0 ≤ 7.65.0 Version: 7.64.1 ≤ 7.64.1 Version: 7.64.0 ≤ 7.64.0 Version: 7.63.0 ≤ 7.63.0 Version: 7.62.0 ≤ 7.62.0 Version: 7.61.1 ≤ 7.61.1 Version: 7.61.0 ≤ 7.61.0 Version: 7.60.0 ≤ 7.60.0 Version: 7.59.0 ≤ 7.59.0 Version: 7.58.0 ≤ 7.58.0 Version: 7.57.0 ≤ 7.57.0 Version: 7.56.1 ≤ 7.56.1 Version: 7.56.0 ≤ 7.56.0 Version: 7.55.1 ≤ 7.55.1 Version: 7.55.0 ≤ 7.55.0 Version: 7.54.1 ≤ 7.54.1 Version: 7.54.0 ≤ 7.54.0 Version: 7.53.1 ≤ 7.53.1 Version: 7.53.0 ≤ 7.53.0 Version: 7.52.1 ≤ 7.52.1 Version: 7.52.0 ≤ 7.52.0 Version: 7.51.0 ≤ 7.51.0 Version: 7.50.3 ≤ 7.50.3 Version: 7.50.2 ≤ 7.50.2 Version: 7.50.1 ≤ 7.50.1 Version: 7.50.0 ≤ 7.50.0 Version: 7.49.1 ≤ 7.49.1 Version: 7.49.0 ≤ 7.49.0 Version: 7.48.0 ≤ 7.48.0 Version: 7.47.1 ≤ 7.47.1 Version: 7.47.0 ≤ 7.47.0 Version: 7.46.0 ≤ 7.46.0 Version: 7.45.0 ≤ 7.45.0 Version: 7.44.0 ≤ 7.44.0 Version: 7.43.0 ≤ 7.43.0 Version: 7.42.1 ≤ 7.42.1 Version: 7.42.0 ≤ 7.42.0 Version: 7.41.0 ≤ 7.41.0 Version: 7.40.0 ≤ 7.40.0 Version: 7.39.0 ≤ 7.39.0 Version: 7.38.0 ≤ 7.38.0 Version: 7.37.1 ≤ 7.37.1 Version: 7.37.0 ≤ 7.37.0 Version: 7.36.0 ≤ 7.36.0 Version: 7.35.0 ≤ 7.35.0 Version: 7.34.0 ≤ 7.34.0 Version: 7.33.0 ≤ 7.33.0 Version: 7.32.0 ≤ 7.32.0 Version: 7.31.0 ≤ 7.31.0 Version: 7.30.0 ≤ 7.30.0 Version: 7.29.0 ≤ 7.29.0 Version: 7.28.1 ≤ 7.28.1 Version: 7.28.0 ≤ 7.28.0 Version: 7.27.0 ≤ 7.27.0 Version: 7.26.0 ≤ 7.26.0 Version: 7.25.0 ≤ 7.25.0 Version: 7.24.0 ≤ 7.24.0 Version: 7.23.1 ≤ 7.23.1 Version: 7.23.0 ≤ 7.23.0 Version: 7.22.0 ≤ 7.22.0 Version: 7.21.7 ≤ 7.21.7 Version: 7.21.6 ≤ 7.21.6 Version: 7.21.5 ≤ 7.21.5 Version: 7.21.4 ≤ 7.21.4 Version: 7.21.3 ≤ 7.21.3 Version: 7.21.2 ≤ 7.21.2 Version: 7.21.1 ≤ 7.21.1 Version: 7.21.0 ≤ 7.21.0 Version: 7.20.1 ≤ 7.20.1 Version: 7.20.0 ≤ 7.20.0 Version: 7.19.7 ≤ 7.19.7 Version: 7.19.6 ≤ 7.19.6 Version: 7.19.5 ≤ 7.19.5 Version: 7.19.4 ≤ 7.19.4 Version: 7.19.3 ≤ 7.19.3 Version: 7.19.2 ≤ 7.19.2 Version: 7.19.1 ≤ 7.19.1 Version: 7.19.0 ≤ 7.19.0 Version: 7.18.2 ≤ 7.18.2 Version: 7.18.1 ≤ 7.18.1 Version: 7.18.0 ≤ 7.18.0 Version: 7.17.1 ≤ 7.17.1 Version: 7.17.0 ≤ 7.17.0 Version: 7.16.4 ≤ 7.16.4 Version: 7.16.3 ≤ 7.16.3 Version: 7.16.2 ≤ 7.16.2 Version: 7.16.1 ≤ 7.16.1 Version: 7.16.0 ≤ 7.16.0 Version: 7.15.5 ≤ 7.15.5 Version: 7.15.4 ≤ 7.15.4 Version: 7.15.3 ≤ 7.15.3 Version: 7.15.2 ≤ 7.15.2 Version: 7.15.1 ≤ 7.15.1 Version: 7.15.0 ≤ 7.15.0 Version: 7.14.1 ≤ 7.14.1 Version: 7.14.0 ≤ 7.14.0 Version: 7.13.2 ≤ 7.13.2 Version: 7.13.1 ≤ 7.13.1 Version: 7.13.0 ≤ 7.13.0 Version: 7.12.3 ≤ 7.12.3 Version: 7.12.2 ≤ 7.12.2 Version: 7.12.1 ≤ 7.12.1 Version: 7.12.0 ≤ 7.12.0 Version: 7.11.2 ≤ 7.11.2 Version: 7.11.1 ≤ 7.11.1 Version: 7.11.0 ≤ 7.11.0 Version: 7.10.8 ≤ 7.10.8 Version: 7.10.7 ≤ 7.10.7 Version: 7.10.6 ≤ 7.10.6 Version: 7.10.5 ≤ 7.10.5 Version: 7.10.4 ≤ 7.10.4 Version: 7.10.3 ≤ 7.10.3 Version: 7.10.2 ≤ 7.10.2 Version: 7.10.1 ≤ 7.10.1 Version: 7.10 ≤ 7.10 Version: 7.9.8 ≤ 7.9.8 Version: 7.9.7 ≤ 7.9.7 Version: 7.9.6 ≤ 7.9.6 Version: 7.9.5 ≤ 7.9.5 Version: 7.9.4 ≤ 7.9.4 Version: 7.9.3 ≤ 7.9.3 Version: 7.9.2 ≤ 7.9.2 Version: 7.9.1 ≤ 7.9.1 Version: 7.9 ≤ 7.9 Version: 7.8.1 ≤ 7.8.1 Version: 7.8 ≤ 7.8 Version: 7.7.3 ≤ 7.7.3 Version: 7.7.2 ≤ 7.7.2 Version: 7.7.1 ≤ 7.7.1 Version: 7.7 ≤ 7.7 Version: 7.6.1 ≤ 7.6.1 Version: 7.6 ≤ 7.6 Version: 7.5.2 ≤ 7.5.2 Version: 7.5.1 ≤ 7.5.1 Version: 7.5 ≤ 7.5 Version: 7.4.2 ≤ 7.4.2 Version: 7.4.1 ≤ 7.4.1 Version: 7.4 ≤ 7.4 Version: 7.3 ≤ 7.3 Version: 7.2.1 ≤ 7.2.1 Version: 7.2 ≤ 7.2 Version: 7.1.1 ≤ 7.1.1 Version: 7.1 ≤ 7.1 Version: 6.5.2 ≤ 6.5.2 Version: 6.5.1 ≤ 6.5.1 Version: 6.5 ≤ 6.5 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:36:27.027Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/12/11/1"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250124-0012/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250131-0003/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250131-0004/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-11053",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-15T16:47:42.738403Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-15T16:50:59.398Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "curl",
"vendor": "curl",
"versions": [
{
"lessThanOrEqual": "8.11.0",
"status": "affected",
"version": "8.11.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.1",
"status": "affected",
"version": "8.10.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.0",
"status": "affected",
"version": "8.10.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.9.1",
"status": "affected",
"version": "8.9.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.9.0",
"status": "affected",
"version": "8.9.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.8.0",
"status": "affected",
"version": "8.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.7.1",
"status": "affected",
"version": "8.7.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.7.0",
"status": "affected",
"version": "8.7.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.6.0",
"status": "affected",
"version": "8.6.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.5.0",
"status": "affected",
"version": "8.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.4.0",
"status": "affected",
"version": "8.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.3.0",
"status": "affected",
"version": "8.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2.1",
"status": "affected",
"version": "8.2.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2.0",
"status": "affected",
"version": "8.2.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.2",
"status": "affected",
"version": "8.1.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.1",
"status": "affected",
"version": "8.1.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.0",
"status": "affected",
"version": "8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.1",
"status": "affected",
"version": "8.0.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.0",
"status": "affected",
"version": "8.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.88.1",
"status": "affected",
"version": "7.88.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.88.0",
"status": "affected",
"version": "7.88.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.87.0",
"status": "affected",
"version": "7.87.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.86.0",
"status": "affected",
"version": "7.86.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.85.0",
"status": "affected",
"version": "7.85.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.84.0",
"status": "affected",
"version": "7.84.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.83.1",
"status": "affected",
"version": "7.83.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.83.0",
"status": "affected",
"version": "7.83.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.82.0",
"status": "affected",
"version": "7.82.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.81.0",
"status": "affected",
"version": "7.81.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.80.0",
"status": "affected",
"version": "7.80.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.79.1",
"status": "affected",
"version": "7.79.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.79.0",
"status": "affected",
"version": "7.79.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.78.0",
"status": "affected",
"version": "7.78.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.77.0",
"status": "affected",
"version": "7.77.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.76.1",
"status": "affected",
"version": "7.76.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.76.0",
"status": "affected",
"version": "7.76.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.75.0",
"status": "affected",
"version": "7.75.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.74.0",
"status": "affected",
"version": "7.74.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.73.0",
"status": "affected",
"version": "7.73.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.72.0",
"status": "affected",
"version": "7.72.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.71.1",
"status": "affected",
"version": "7.71.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.71.0",
"status": "affected",
"version": "7.71.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.70.0",
"status": "affected",
"version": "7.70.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.69.1",
"status": "affected",
"version": "7.69.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.69.0",
"status": "affected",
"version": "7.69.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.68.0",
"status": "affected",
"version": "7.68.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.67.0",
"status": "affected",
"version": "7.67.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.66.0",
"status": "affected",
"version": "7.66.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.3",
"status": "affected",
"version": "7.65.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.2",
"status": "affected",
"version": "7.65.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.1",
"status": "affected",
"version": "7.65.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.0",
"status": "affected",
"version": "7.65.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.64.1",
"status": "affected",
"version": "7.64.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.64.0",
"status": "affected",
"version": "7.64.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.63.0",
"status": "affected",
"version": "7.63.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.62.0",
"status": "affected",
"version": "7.62.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.61.1",
"status": "affected",
"version": "7.61.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.61.0",
"status": "affected",
"version": "7.61.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.60.0",
"status": "affected",
"version": "7.60.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.59.0",
"status": "affected",
"version": "7.59.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.58.0",
"status": "affected",
"version": "7.58.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.57.0",
"status": "affected",
"version": "7.57.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.56.1",
"status": "affected",
"version": "7.56.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.56.0",
"status": "affected",
"version": "7.56.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.55.1",
"status": "affected",
"version": "7.55.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.55.0",
"status": "affected",
"version": "7.55.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.54.1",
"status": "affected",
"version": "7.54.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.54.0",
"status": "affected",
"version": "7.54.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.53.1",
"status": "affected",
"version": "7.53.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.53.0",
"status": "affected",
"version": "7.53.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.52.1",
"status": "affected",
"version": "7.52.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.52.0",
"status": "affected",
"version": "7.52.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.51.0",
"status": "affected",
"version": "7.51.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.50.3",
"status": "affected",
"version": "7.50.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.50.2",
"status": "affected",
"version": "7.50.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.50.1",
"status": "affected",
"version": "7.50.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.50.0",
"status": "affected",
"version": "7.50.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.49.1",
"status": "affected",
"version": "7.49.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.49.0",
"status": "affected",
"version": "7.49.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.48.0",
"status": "affected",
"version": "7.48.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.47.1",
"status": "affected",
"version": "7.47.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.47.0",
"status": "affected",
"version": "7.47.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.46.0",
"status": "affected",
"version": "7.46.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.45.0",
"status": "affected",
"version": "7.45.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.44.0",
"status": "affected",
"version": "7.44.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.43.0",
"status": "affected",
"version": "7.43.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.42.1",
"status": "affected",
"version": "7.42.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.42.0",
"status": "affected",
"version": "7.42.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.41.0",
"status": "affected",
"version": "7.41.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.40.0",
"status": "affected",
"version": "7.40.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.39.0",
"status": "affected",
"version": "7.39.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.38.0",
"status": "affected",
"version": "7.38.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.37.1",
"status": "affected",
"version": "7.37.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.37.0",
"status": "affected",
"version": "7.37.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.36.0",
"status": "affected",
"version": "7.36.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.35.0",
"status": "affected",
"version": "7.35.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.34.0",
"status": "affected",
"version": "7.34.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.33.0",
"status": "affected",
"version": "7.33.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.32.0",
"status": "affected",
"version": "7.32.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.31.0",
"status": "affected",
"version": "7.31.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.30.0",
"status": "affected",
"version": "7.30.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.29.0",
"status": "affected",
"version": "7.29.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.28.1",
"status": "affected",
"version": "7.28.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.28.0",
"status": "affected",
"version": "7.28.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.27.0",
"status": "affected",
"version": "7.27.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.26.0",
"status": "affected",
"version": "7.26.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.25.0",
"status": "affected",
"version": "7.25.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.24.0",
"status": "affected",
"version": "7.24.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.23.1",
"status": "affected",
"version": "7.23.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.23.0",
"status": "affected",
"version": "7.23.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.22.0",
"status": "affected",
"version": "7.22.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.21.7",
"status": "affected",
"version": "7.21.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.21.6",
"status": "affected",
"version": "7.21.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.21.5",
"status": "affected",
"version": "7.21.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.21.4",
"status": "affected",
"version": "7.21.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.21.3",
"status": "affected",
"version": "7.21.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.21.2",
"status": "affected",
"version": "7.21.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.21.1",
"status": "affected",
"version": "7.21.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.21.0",
"status": "affected",
"version": "7.21.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.20.1",
"status": "affected",
"version": "7.20.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.20.0",
"status": "affected",
"version": "7.20.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.19.7",
"status": "affected",
"version": "7.19.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.19.6",
"status": "affected",
"version": "7.19.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.19.5",
"status": "affected",
"version": "7.19.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.19.4",
"status": "affected",
"version": "7.19.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.19.3",
"status": "affected",
"version": "7.19.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.19.2",
"status": "affected",
"version": "7.19.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.19.1",
"status": "affected",
"version": "7.19.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.19.0",
"status": "affected",
"version": "7.19.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.18.2",
"status": "affected",
"version": "7.18.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.18.1",
"status": "affected",
"version": "7.18.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.18.0",
"status": "affected",
"version": "7.18.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.17.1",
"status": "affected",
"version": "7.17.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.17.0",
"status": "affected",
"version": "7.17.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.16.4",
"status": "affected",
"version": "7.16.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.16.3",
"status": "affected",
"version": "7.16.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.16.2",
"status": "affected",
"version": "7.16.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.16.1",
"status": "affected",
"version": "7.16.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.16.0",
"status": "affected",
"version": "7.16.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.15.5",
"status": "affected",
"version": "7.15.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.15.4",
"status": "affected",
"version": "7.15.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.15.3",
"status": "affected",
"version": "7.15.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.15.2",
"status": "affected",
"version": "7.15.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.15.1",
"status": "affected",
"version": "7.15.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.15.0",
"status": "affected",
"version": "7.15.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.14.1",
"status": "affected",
"version": "7.14.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.14.0",
"status": "affected",
"version": "7.14.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.13.2",
"status": "affected",
"version": "7.13.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.13.1",
"status": "affected",
"version": "7.13.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.13.0",
"status": "affected",
"version": "7.13.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.12.3",
"status": "affected",
"version": "7.12.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.12.2",
"status": "affected",
"version": "7.12.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.12.1",
"status": "affected",
"version": "7.12.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.12.0",
"status": "affected",
"version": "7.12.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.11.2",
"status": "affected",
"version": "7.11.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "7.11.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.11.0",
"status": "affected",
"version": "7.11.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10.8",
"status": "affected",
"version": "7.10.8",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10.7",
"status": "affected",
"version": "7.10.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10.6",
"status": "affected",
"version": "7.10.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10.5",
"status": "affected",
"version": "7.10.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10.4",
"status": "affected",
"version": "7.10.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10.3",
"status": "affected",
"version": "7.10.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10.2",
"status": "affected",
"version": "7.10.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10.1",
"status": "affected",
"version": "7.10.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.10",
"status": "affected",
"version": "7.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9.8",
"status": "affected",
"version": "7.9.8",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9.7",
"status": "affected",
"version": "7.9.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9.6",
"status": "affected",
"version": "7.9.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9.5",
"status": "affected",
"version": "7.9.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9.4",
"status": "affected",
"version": "7.9.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9.3",
"status": "affected",
"version": "7.9.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9.2",
"status": "affected",
"version": "7.9.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9.1",
"status": "affected",
"version": "7.9.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.9",
"status": "affected",
"version": "7.9",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.8.1",
"status": "affected",
"version": "7.8.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.8",
"status": "affected",
"version": "7.8",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.7.3",
"status": "affected",
"version": "7.7.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.7.2",
"status": "affected",
"version": "7.7.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.7.1",
"status": "affected",
"version": "7.7.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.7",
"status": "affected",
"version": "7.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.6.1",
"status": "affected",
"version": "7.6.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.6",
"status": "affected",
"version": "7.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.5.2",
"status": "affected",
"version": "7.5.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.5.1",
"status": "affected",
"version": "7.5.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.5",
"status": "affected",
"version": "7.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.4.2",
"status": "affected",
"version": "7.4.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.4.1",
"status": "affected",
"version": "7.4.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.4",
"status": "affected",
"version": "7.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.3",
"status": "affected",
"version": "7.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.2.1",
"status": "affected",
"version": "7.2.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.2",
"status": "affected",
"version": "7.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.1.1",
"status": "affected",
"version": "7.1.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.1",
"status": "affected",
"version": "7.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5.2",
"status": "affected",
"version": "6.5.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5.1",
"status": "affected",
"version": "6.5.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5",
"status": "affected",
"version": "6.5",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Harry Sintonen"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Daniel Stenberg"
}
],
"descriptions": [
{
"lang": "en",
"value": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T07:34:29.539Z",
"orgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
"shortName": "curl"
},
"references": [
{
"name": "json",
"url": "https://curl.se/docs/CVE-2024-11053.json"
},
{
"name": "www",
"url": "https://curl.se/docs/CVE-2024-11053.html"
},
{
"name": "issue",
"url": "https://hackerone.com/reports/2829063"
}
],
"title": "netrc and redirect credential leak"
}
},
"cveMetadata": {
"assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
"assignerShortName": "curl",
"cveId": "CVE-2024-11053",
"datePublished": "2024-12-11T07:34:29.539Z",
"dateReserved": "2024-11-09T18:41:55.703Z",
"dateUpdated": "2025-11-03T20:36:27.027Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-11053\",\"sourceIdentifier\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"published\":\"2024-12-11T08:15:05.307\",\"lastModified\":\"2025-11-03T21:16:04.243\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When asked to both use a `.netrc` file for credentials and to follow HTTP\\nredirects, curl could leak the password used for the first host to the\\nfollowed-to host under certain circumstances.\\n\\nThis flaw only manifests itself if the netrc file has an entry that matches\\nthe redirect target hostname but the entry either omits just the password or\\nomits both login and password.\"},{\"lang\":\"es\",\"value\":\"Cuando se le pide que use un archivo `.netrc` para las credenciales y que siga las redirecciones HTTP, curl podr\u00eda filtrar la contrase\u00f1a utilizada para el primer host al host al que sigue en determinadas circunstancias. Esta falla solo se manifiesta si el archivo netrc tiene una entrada que coincide con el nombre de host de destino de la redirecci\u00f3n, pero la entrada omite solo la contrase\u00f1a u omite tanto el nombre de usuario como la contrase\u00f1a.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N\",\"baseScore\":3.4,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.76.0\",\"versionEndExcluding\":\"8.11.1\",\"matchCriteriaId\":\"F834FD12-881B-47A6-90B0-A440E61A9CE0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20333EE-4C13-426E-8B54-D78679D5DDB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89612649-BACF-4FAC-9BA4-324724FD93A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D9B255-C1AF-42D1-BF9B-13642FBDC080\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7CFE0E-9D1E-4495-B302-89C3096FC0DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5921A877-18BF-43FE-915C-D226E140ACFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7296A1F2-D315-4FD5-8A73-65C480C855BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]}],\"references\":[{\"url\":\"https://curl.se/docs/CVE-2024-11053.html\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://curl.se/docs/CVE-2024-11053.json\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://hackerone.com/reports/2829063\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/12/11/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250124-0012/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250131-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250131-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2024/12/11/1\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250124-0012/\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250131-0003/\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250131-0004/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T20:36:27.027Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 3.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-11053\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-15T16:47:42.738403Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-11T15:00:16.326Z\"}}], \"cna\": {\"title\": \"netrc and redirect credential leak\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Harry Sintonen\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Daniel Stenberg\"}], \"affected\": [{\"vendor\": \"curl\", \"product\": \"curl\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.11.0\"}, {\"status\": \"affected\", \"version\": \"8.10.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.1\"}, {\"status\": \"affected\", \"version\": \"8.10.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.0\"}, {\"status\": \"affected\", \"version\": \"8.9.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.1\"}, {\"status\": \"affected\", \"version\": \"8.9.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.0\"}, {\"status\": \"affected\", \"version\": \"8.8.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.8.0\"}, {\"status\": \"affected\", \"version\": \"8.7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.1\"}, {\"status\": \"affected\", \"version\": \"8.7.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.0\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.6.0\"}, {\"status\": \"affected\", \"version\": \"8.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.0\"}, {\"status\": \"affected\", \"version\": \"8.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.4.0\"}, {\"status\": \"affected\", \"version\": \"8.3.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.3.0\"}, {\"status\": \"affected\", \"version\": \"8.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.1\"}, {\"status\": \"affected\", \"version\": \"8.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.0\"}, {\"status\": \"affected\", \"version\": \"8.1.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.2\"}, {\"status\": \"affected\", \"version\": \"8.1.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.1\"}, {\"status\": \"affected\", \"version\": \"8.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.0\"}, {\"status\": \"affected\", \"version\": \"8.0.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.1\"}, {\"status\": \"affected\", \"version\": \"8.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.0\"}, {\"status\": \"affected\", \"version\": \"7.88.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.1\"}, {\"status\": \"affected\", \"version\": \"7.88.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.0\"}, {\"status\": \"affected\", \"version\": \"7.87.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.87.0\"}, {\"status\": \"affected\", \"version\": \"7.86.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.86.0\"}, {\"status\": \"affected\", \"version\": \"7.85.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.85.0\"}, {\"status\": \"affected\", \"version\": \"7.84.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.84.0\"}, {\"status\": \"affected\", \"version\": \"7.83.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.83.1\"}, {\"status\": \"affected\", \"version\": \"7.83.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.83.0\"}, {\"status\": \"affected\", \"version\": \"7.82.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.82.0\"}, {\"status\": \"affected\", \"version\": \"7.81.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.81.0\"}, {\"status\": \"affected\", \"version\": \"7.80.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.80.0\"}, {\"status\": \"affected\", \"version\": \"7.79.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.79.1\"}, {\"status\": \"affected\", \"version\": \"7.79.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.79.0\"}, {\"status\": \"affected\", \"version\": \"7.78.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.78.0\"}, {\"status\": \"affected\", \"version\": \"7.77.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.77.0\"}, {\"status\": \"affected\", \"version\": \"7.76.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.76.1\"}, {\"status\": \"affected\", \"version\": \"7.76.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.76.0\"}, {\"status\": \"affected\", \"version\": \"7.75.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.75.0\"}, {\"status\": \"affected\", \"version\": \"7.74.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.74.0\"}, {\"status\": \"affected\", \"version\": \"7.73.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.73.0\"}, {\"status\": \"affected\", \"version\": \"7.72.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.72.0\"}, {\"status\": \"affected\", \"version\": \"7.71.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.71.1\"}, {\"status\": \"affected\", \"version\": \"7.71.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.71.0\"}, {\"status\": \"affected\", \"version\": \"7.70.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.70.0\"}, {\"status\": \"affected\", \"version\": \"7.69.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.69.1\"}, {\"status\": \"affected\", \"version\": \"7.69.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.69.0\"}, {\"status\": \"affected\", \"version\": \"7.68.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.68.0\"}, {\"status\": \"affected\", \"version\": \"7.67.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.67.0\"}, {\"status\": \"affected\", \"version\": \"7.66.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.66.0\"}, {\"status\": \"affected\", \"version\": \"7.65.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.3\"}, {\"status\": \"affected\", \"version\": \"7.65.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.2\"}, {\"status\": \"affected\", \"version\": \"7.65.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.1\"}, {\"status\": \"affected\", \"version\": \"7.65.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.0\"}, {\"status\": \"affected\", \"version\": \"7.64.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.64.1\"}, {\"status\": \"affected\", \"version\": \"7.64.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.64.0\"}, {\"status\": \"affected\", \"version\": \"7.63.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.63.0\"}, {\"status\": \"affected\", \"version\": \"7.62.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.62.0\"}, {\"status\": \"affected\", \"version\": \"7.61.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.61.1\"}, {\"status\": \"affected\", \"version\": \"7.61.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.61.0\"}, {\"status\": \"affected\", \"version\": \"7.60.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.60.0\"}, {\"status\": \"affected\", \"version\": \"7.59.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.59.0\"}, {\"status\": \"affected\", \"version\": \"7.58.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.58.0\"}, {\"status\": \"affected\", \"version\": \"7.57.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.57.0\"}, {\"status\": \"affected\", \"version\": \"7.56.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.56.1\"}, {\"status\": \"affected\", \"version\": \"7.56.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.56.0\"}, {\"status\": \"affected\", \"version\": \"7.55.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.55.1\"}, {\"status\": \"affected\", \"version\": \"7.55.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.55.0\"}, {\"status\": \"affected\", \"version\": \"7.54.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.54.1\"}, {\"status\": \"affected\", \"version\": \"7.54.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.54.0\"}, {\"status\": \"affected\", \"version\": \"7.53.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.53.1\"}, {\"status\": \"affected\", \"version\": \"7.53.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.53.0\"}, {\"status\": \"affected\", \"version\": \"7.52.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.52.1\"}, {\"status\": \"affected\", \"version\": \"7.52.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.52.0\"}, {\"status\": \"affected\", \"version\": \"7.51.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.51.0\"}, {\"status\": \"affected\", \"version\": \"7.50.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.3\"}, {\"status\": \"affected\", \"version\": \"7.50.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.2\"}, {\"status\": \"affected\", \"version\": \"7.50.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.1\"}, {\"status\": \"affected\", \"version\": \"7.50.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.0\"}, {\"status\": \"affected\", \"version\": \"7.49.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.49.1\"}, {\"status\": \"affected\", \"version\": \"7.49.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.49.0\"}, {\"status\": \"affected\", \"version\": \"7.48.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.48.0\"}, {\"status\": \"affected\", \"version\": \"7.47.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.47.1\"}, {\"status\": \"affected\", \"version\": \"7.47.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.47.0\"}, {\"status\": \"affected\", \"version\": \"7.46.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.46.0\"}, {\"status\": \"affected\", \"version\": \"7.45.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.45.0\"}, {\"status\": \"affected\", \"version\": \"7.44.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.44.0\"}, {\"status\": \"affected\", \"version\": \"7.43.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.43.0\"}, {\"status\": \"affected\", \"version\": \"7.42.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.42.1\"}, {\"status\": \"affected\", \"version\": \"7.42.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.42.0\"}, {\"status\": \"affected\", \"version\": \"7.41.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.41.0\"}, {\"status\": \"affected\", \"version\": \"7.40.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.40.0\"}, {\"status\": \"affected\", \"version\": \"7.39.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.39.0\"}, {\"status\": \"affected\", \"version\": \"7.38.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.38.0\"}, {\"status\": \"affected\", \"version\": \"7.37.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.37.1\"}, {\"status\": \"affected\", \"version\": \"7.37.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.37.0\"}, {\"status\": \"affected\", \"version\": \"7.36.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.36.0\"}, {\"status\": \"affected\", \"version\": \"7.35.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.35.0\"}, {\"status\": \"affected\", \"version\": \"7.34.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.34.0\"}, {\"status\": \"affected\", \"version\": \"7.33.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.33.0\"}, {\"status\": \"affected\", \"version\": \"7.32.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.32.0\"}, {\"status\": \"affected\", \"version\": \"7.31.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.31.0\"}, {\"status\": \"affected\", \"version\": \"7.30.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.30.0\"}, {\"status\": \"affected\", \"version\": \"7.29.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.29.0\"}, {\"status\": \"affected\", \"version\": \"7.28.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.28.1\"}, {\"status\": \"affected\", \"version\": \"7.28.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.28.0\"}, {\"status\": \"affected\", \"version\": \"7.27.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.27.0\"}, {\"status\": \"affected\", \"version\": \"7.26.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.26.0\"}, {\"status\": \"affected\", \"version\": \"7.25.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.25.0\"}, {\"status\": \"affected\", \"version\": \"7.24.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.24.0\"}, {\"status\": \"affected\", \"version\": \"7.23.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.23.1\"}, {\"status\": \"affected\", \"version\": \"7.23.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.23.0\"}, {\"status\": \"affected\", \"version\": \"7.22.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.22.0\"}, {\"status\": \"affected\", \"version\": \"7.21.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.7\"}, {\"status\": \"affected\", \"version\": \"7.21.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.6\"}, {\"status\": \"affected\", \"version\": \"7.21.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.5\"}, {\"status\": \"affected\", \"version\": \"7.21.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.4\"}, {\"status\": \"affected\", \"version\": \"7.21.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.3\"}, {\"status\": \"affected\", \"version\": \"7.21.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.2\"}, {\"status\": \"affected\", \"version\": \"7.21.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.1\"}, {\"status\": \"affected\", \"version\": \"7.21.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.0\"}, {\"status\": \"affected\", \"version\": \"7.20.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.20.1\"}, {\"status\": \"affected\", \"version\": \"7.20.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.20.0\"}, {\"status\": \"affected\", \"version\": \"7.19.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.7\"}, {\"status\": \"affected\", \"version\": \"7.19.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.6\"}, {\"status\": \"affected\", \"version\": \"7.19.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.5\"}, {\"status\": \"affected\", \"version\": \"7.19.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.4\"}, {\"status\": \"affected\", \"version\": \"7.19.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.3\"}, {\"status\": \"affected\", \"version\": \"7.19.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.2\"}, {\"status\": \"affected\", \"version\": \"7.19.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.1\"}, {\"status\": \"affected\", \"version\": \"7.19.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.0\"}, {\"status\": \"affected\", \"version\": \"7.18.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.18.2\"}, {\"status\": \"affected\", \"version\": \"7.18.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.18.1\"}, {\"status\": \"affected\", \"version\": \"7.18.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.18.0\"}, {\"status\": \"affected\", \"version\": \"7.17.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.17.1\"}, {\"status\": \"affected\", \"version\": \"7.17.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.17.0\"}, {\"status\": \"affected\", \"version\": \"7.16.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.4\"}, {\"status\": \"affected\", \"version\": \"7.16.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.3\"}, {\"status\": \"affected\", \"version\": \"7.16.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.2\"}, {\"status\": \"affected\", \"version\": \"7.16.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.1\"}, {\"status\": \"affected\", \"version\": \"7.16.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.0\"}, {\"status\": \"affected\", \"version\": \"7.15.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.5\"}, {\"status\": \"affected\", \"version\": \"7.15.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.4\"}, {\"status\": \"affected\", \"version\": \"7.15.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.3\"}, {\"status\": \"affected\", \"version\": \"7.15.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.2\"}, {\"status\": \"affected\", \"version\": \"7.15.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.1\"}, {\"status\": \"affected\", \"version\": \"7.15.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.0\"}, {\"status\": \"affected\", \"version\": \"7.14.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.14.1\"}, {\"status\": \"affected\", \"version\": \"7.14.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.14.0\"}, {\"status\": \"affected\", \"version\": \"7.13.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.13.2\"}, {\"status\": \"affected\", \"version\": \"7.13.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.13.1\"}, {\"status\": \"affected\", \"version\": \"7.13.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.13.0\"}, {\"status\": \"affected\", \"version\": \"7.12.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.12.3\"}, {\"status\": \"affected\", \"version\": \"7.12.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.12.2\"}, {\"status\": \"affected\", \"version\": \"7.12.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.12.1\"}, {\"status\": \"affected\", \"version\": \"7.12.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.12.0\"}, {\"status\": \"affected\", \"version\": \"7.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.11.2\"}, {\"status\": \"affected\", \"version\": \"7.11.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.11.1\"}, {\"status\": \"affected\", \"version\": \"7.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.11.0\"}, {\"status\": \"affected\", \"version\": \"7.10.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.8\"}, {\"status\": \"affected\", \"version\": \"7.10.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.7\"}, {\"status\": \"affected\", \"version\": \"7.10.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.6\"}, {\"status\": \"affected\", \"version\": \"7.10.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.5\"}, {\"status\": \"affected\", \"version\": \"7.10.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.4\"}, {\"status\": \"affected\", \"version\": \"7.10.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.3\"}, {\"status\": \"affected\", \"version\": \"7.10.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.2\"}, {\"status\": \"affected\", \"version\": \"7.10.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.1\"}, {\"status\": \"affected\", \"version\": \"7.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10\"}, {\"status\": \"affected\", \"version\": \"7.9.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.8\"}, {\"status\": \"affected\", \"version\": \"7.9.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.7\"}, {\"status\": \"affected\", \"version\": \"7.9.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.6\"}, {\"status\": \"affected\", \"version\": \"7.9.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.5\"}, {\"status\": \"affected\", \"version\": \"7.9.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.4\"}, {\"status\": \"affected\", \"version\": \"7.9.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.3\"}, {\"status\": \"affected\", \"version\": \"7.9.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.2\"}, {\"status\": \"affected\", \"version\": \"7.9.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.1\"}, {\"status\": \"affected\", \"version\": \"7.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9\"}, {\"status\": \"affected\", \"version\": \"7.8.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.8.1\"}, {\"status\": \"affected\", \"version\": \"7.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.8\"}, {\"status\": \"affected\", \"version\": \"7.7.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.7.3\"}, {\"status\": \"affected\", \"version\": \"7.7.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.7.2\"}, {\"status\": \"affected\", \"version\": \"7.7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.7.1\"}, {\"status\": \"affected\", \"version\": \"7.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.7\"}, {\"status\": \"affected\", \"version\": \"7.6.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.6.1\"}, {\"status\": \"affected\", \"version\": \"7.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.6\"}, {\"status\": \"affected\", \"version\": \"7.5.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.5.2\"}, {\"status\": \"affected\", \"version\": \"7.5.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.5.1\"}, {\"status\": \"affected\", \"version\": \"7.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.5\"}, {\"status\": \"affected\", \"version\": \"7.4.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4.2\"}, {\"status\": \"affected\", \"version\": \"7.4.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4.1\"}, {\"status\": \"affected\", \"version\": \"7.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4\"}, {\"status\": \"affected\", \"version\": \"7.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.3\"}, {\"status\": \"affected\", \"version\": \"7.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.2.1\"}, {\"status\": \"affected\", \"version\": \"7.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.2\"}, {\"status\": \"affected\", \"version\": \"7.1.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.1.1\"}, {\"status\": \"affected\", \"version\": \"7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.1\"}, {\"status\": \"affected\", \"version\": \"6.5.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.2\"}, {\"status\": \"affected\", \"version\": \"6.5.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.1\"}, {\"status\": \"affected\", \"version\": \"6.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://curl.se/docs/CVE-2024-11053.json\", \"name\": \"json\"}, {\"url\": \"https://curl.se/docs/CVE-2024-11053.html\", \"name\": \"www\"}, {\"url\": \"https://hackerone.com/reports/2829063\", \"name\": \"issue\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When asked to both use a `.netrc` file for credentials and to follow HTTP\\nredirects, curl could leak the password used for the first host to the\\nfollowed-to host under certain circumstances.\\n\\nThis flaw only manifests itself if the netrc file has an entry that matches\\nthe redirect target hostname but the entry either omits just the password or\\nomits both login and password.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"shortName\": \"curl\", \"dateUpdated\": \"2024-12-11T07:34:29.539Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-11053\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T20:36:27.027Z\", \"dateReserved\": \"2024-11-09T18:41:55.703Z\", \"assignerOrgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"datePublished\": \"2024-12-11T07:34:29.539Z\", \"assignerShortName\": \"curl\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
wid-sec-w-2024-3676
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "cURL ist eine Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in cURL ausnutzen, um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3676 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3676.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3676 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3676"
},
{
"category": "external",
"summary": "curl Security Advisory vom 2024-12-10",
"url": "https://curl.se/docs/CVE-2024-11053.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4284-1 vom 2024-12-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019987.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4287-1 vom 2024-12-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019984.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4288-1 vom 2024-12-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019983.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7162-1 vom 2024-12-16",
"url": "https://ubuntu.com/security/notices/USN-7162-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4359-1 vom 2024-12-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/W3C7YLNBMW5MPRUQMR5IFUYVSRD5UKHG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4284-2 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020031.html"
}
],
"source_lang": "en-US",
"title": "cURL: Schwachstelle erm\u00f6glicht Offenlegung von Informationen",
"tracking": {
"current_release_date": "2024-12-19T23:00:00.000+00:00",
"generator": {
"date": "2024-12-20T09:12:25.445+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-3676",
"initial_release_date": "2024-12-10T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.11.1",
"product": {
"name": "Open Source cURL \u003c8.11.1",
"product_id": "T039776"
}
},
{
"category": "product_version",
"name": "8.11.1",
"product": {
"name": "Open Source cURL 8.11.1",
"product_id": "T039776-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:curl:curl:8.11.1"
}
}
}
],
"category": "product_name",
"name": "cURL"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-11053",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in cURL. Dieser Fehler existiert wegen der unsachgem\u00e4\u00dfen Behandlung von Anmeldeinformationen aus der .netrc-Datei, wenn HTTP-Umleitungen gefolgt wird. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um unter bestimmten Bedingungen das f\u00fcr den ersten Host verwendete Passwort an einen umgeleiteten Host weiterzugeben."
}
],
"product_status": {
"known_affected": [
"T002207",
"T000126",
"T039776"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-11053"
}
]
}
CERTFR-2025-AVI-0448
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Nessus Network Monitor. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Network Monitor | Nessus Network Monitor versions antérieures à 6.5.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 6.5.1",
"product": {
"name": "Nessus Network Monitor",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-24916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24916"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-3241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3241"
},
{
"name": "CVE-2023-7256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7256"
},
{
"name": "CVE-2024-8006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8006"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-24917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24917"
}
],
"initial_release_date": "2025-05-23T00:00:00",
"last_revision_date": "2025-05-23T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0448",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus Network Monitor. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus Network Monitor",
"vendor_advisories": [
{
"published_at": "2025-05-23",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-10",
"url": "https://www.tenable.com/security/tns-2025-10"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0102
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Tenable. Entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Identity Exposure | Identity Exposure versions antérieures à 3.77.8 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Identity Exposure versions ant\u00e9rieures \u00e0 3.77.8",
"product": {
"name": "Identity Exposure",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-1091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1091"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0760"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
}
],
"initial_release_date": "2025-02-07T00:00:00",
"last_revision_date": "2025-02-10T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0102",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-07T00:00:00.000000"
},
{
"description": "Ajout des vuln\u00e9rabilit\u00e9s CVE-2025-0167, CVE-2025-0665 et CVE-2025-0725",
"revision_date": "2025-02-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Tenable. Entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Tenable",
"vendor_advisories": [
{
"published_at": "2025-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-01",
"url": "https://www.tenable.com/security/tns-2025-01"
}
]
}
CERTFR-2025-AVI-0563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411.x antérieures à 9.3.2411.107 | ||
| Splunk | SOAR | Splunk SOAR versions antérieures à 6.4.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Splunk DB Connect | Splunk DB Connect versions antérieures à 4.0.0 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408.x antérieures à 9.3.2408.117 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406.x antérieures à 9.2.2406.121 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.1.x antérieures à 9.1.10 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Enterprise Cloud versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.107",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk SOAR versions ant\u00e9rieures \u00e0 6.4.1",
"product": {
"name": "SOAR",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "Splunk DB Connect",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.117",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.121",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2022-30187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
},
{
"name": "CVE-2025-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27414"
},
{
"name": "CVE-2025-20324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20324"
},
{
"name": "CVE-2025-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23388"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-20319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20319"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2025-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20321"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-20325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20325"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-23387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23387"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-23389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23389"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2022-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35583"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
},
{
"name": "CVE-2025-20300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20300"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-20323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20323"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2025-20320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20320"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-45230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45230"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2025-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20322"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-21090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
},
{
"name": "CVE-2013-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-0853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0853"
},
{
"name": "CVE-2025-22952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22952"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2025-07-08T00:00:00",
"last_revision_date": "2025-07-08T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0708",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0708"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0703",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0703"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0701",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0701"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0706",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0706"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0705",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0705"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0702",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0702"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0712",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0712"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0711",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0711"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0707",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0707"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0710",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0710"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0709",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0709"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0704",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0704"
}
]
}
CERTFR-2025-AVI-0150
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Identity Exposure. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Identity Exposure | Identity Exposure versions antérieures à 3.77.9 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Identity Exposure versions ant\u00e9rieures \u00e0 3.77.9",
"product": {
"name": "Identity Exposure",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-1091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1091"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0760"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
}
],
"initial_release_date": "2025-02-21T00:00:00",
"last_revision_date": "2025-02-21T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0150",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Identity Exposure. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Identity Exposure",
"vendor_advisories": [
{
"published_at": "2025-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-01",
"url": "https://www.tenable.com/security/tns-2025-01"
}
]
}
CERTFR-2025-AVI-0054
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.36 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Connectors (Connector/Python) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.6.32 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.39 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Backup version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.36 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors (Connector/Python) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.6.32 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21566"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2025-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-21495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21495"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21548"
},
{
"name": "CVE-2025-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21499"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
},
{
"name": "CVE-2025-21493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21493"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21567",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21567"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"initial_release_date": "2025-01-22T00:00:00",
"last_revision_date": "2025-01-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0054",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujan2025",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
]
}
CERTFR-2024-AVI-1063
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans cURL et libcurl. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Curl | cURL et libcurl | cURL et libcurl versions 6.5 à 8.11.x antérieures à 8.11.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cURL et libcurl versions 6.5 \u00e0 8.11.x ant\u00e9rieures \u00e0 8.11.1",
"product": {
"name": "cURL et libcurl",
"vendor": {
"name": "Curl",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
}
],
"initial_release_date": "2024-12-11T00:00:00",
"last_revision_date": "2024-12-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1063",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans cURL et libcurl. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Vuln\u00e9rabilit\u00e9 dans cURL et libcurl",
"vendor_advisories": [
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2024-11053",
"url": "https://curl.se/docs/CVE-2024-11053.html"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
}
],
"initial_release_date": "2025-07-25T00:00:00",
"last_revision_date": "2025-07-25T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
CERTFR-2025-AVI-0328
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Security Center | Security Center sans le correctif de sécurité Patch SC-202504.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": " Security Center sans le correctif de s\u00e9curit\u00e9 Patch SC-202504.2",
"product": {
"name": "Security Center",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-1217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1217"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-6874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6874"
},
{
"name": "CVE-2025-1736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1736"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2025-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1734"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-1861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1861"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-1219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1219"
}
],
"initial_release_date": "2025-04-17T00:00:00",
"last_revision_date": "2025-04-17T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0328",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Security Center. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Security Center",
"vendor_advisories": [
{
"published_at": "2025-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-04",
"url": "https://www.tenable.com/security/tns-2025-04"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
ncsc-2025-0124
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die vari\u00ebren van 4.3 tot 9.8, wat wijst op significante risico\u0027s voor de beschikbaarheid en vertrouwelijkheid van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "general",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements Used in a Template Engine",
"title": "CWE-1336"
},
{
"category": "general",
"text": "Missing Report of Error Condition",
"title": "CWE-392"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
"title": "CWE-917"
},
{
"category": "general",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-04-16T08:39:55.217751Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0124",
"initial_release_date": "2025-04-16T08:39:55.217751Z",
"revision_history": [
{
"date": "2025-04-16T08:39:55.217751Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838578"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-1838586"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-1838591"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838592"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-1838572"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838581"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.2",
"product": {
"name": "vers:unknown/24.2.2",
"product_id": "CSAFPID-1838584"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=6.0|\u003c=6.1",
"product": {
"name": "vers:unknown/\u003e=6.0|\u003c=6.1",
"product_id": "CSAFPID-2698355"
}
}
],
"category": "product_name",
"name": "Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.3.0",
"product": {
"name": "vers:unknown/24.3.0",
"product_id": "CSAFPID-2698333"
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-2698334"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Network Data Analytics Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.5",
"product": {
"name": "vers:unknown/24.2.5",
"product_id": "CSAFPID-2698374"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.0.0",
"product": {
"name": "vers:unknown/9.0.0",
"product_id": "CSAFPID-1234193"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.1",
"product": {
"name": "vers:unknown/9.0.1",
"product_id": "CSAFPID-1234261"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.2",
"product": {
"name": "vers:unknown/9.0.2",
"product_id": "CSAFPID-2698362"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.3",
"product": {
"name": "vers:unknown/9.0.3",
"product_id": "CSAFPID-2698358"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2698372"
}
}
],
"category": "product_name",
"name": "Communications Element Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/15.0.0.0.0",
"product": {
"name": "vers:unknown/15.0.0.0.0",
"product_id": "CSAFPID-1837923"
}
}
],
"category": "product_name",
"name": "Communications Policy Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2698373"
}
}
],
"category": "product_name",
"name": "Communications Session Report Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.1.1.9",
"product": {
"name": "vers:unknown/9.1.1.9",
"product_id": "CSAFPID-2698357"
}
}
],
"category": "product_name",
"name": "SD-WAN Edge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.3",
"product": {
"name": "vers:unknown/24.2.3",
"product_id": "CSAFPID-1838579"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.3.0",
"product": {
"name": "vers:unknown/24.3.0",
"product_id": "CSAFPID-1838582"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/10.0.0",
"product": {
"name": "vers:unknown/10.0.0",
"product_id": "CSAFPID-2698381"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.2.0",
"product": {
"name": "vers:unknown/9.2.0",
"product_id": "CSAFPID-1207518"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.3.0",
"product": {
"name": "vers:unknown/9.3.0",
"product_id": "CSAFPID-1207704"
}
}
],
"category": "product_name",
"name": "Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/4.1.0",
"product": {
"name": "vers:unknown/4.1.0",
"product_id": "CSAFPID-1207607"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4.2.0",
"product": {
"name": "vers:unknown/4.2.0",
"product_id": "CSAFPID-1207752"
}
}
],
"category": "product_name",
"name": "Enterprise Communications Broker"
}
],
"category": "product_family",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-2698963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698973",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.4",
"product": {
"name": "vers:oracle/24.2.4",
"product_id": "CSAFPID-2699085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core DBTier"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-1839907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
"product_id": "CSAFPID-2698965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
"product": {
"name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
"product_id": "CSAFPID-2698944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.1-24.2.4:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839952",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-2699038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839951",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-2699059",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839919",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1839924",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839894",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2699094",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839934",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2699086",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839935",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/25.1.100",
"product": {
"name": "vers:oracle/25.1.100",
"product_id": "CSAFPID-2699073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:25.1.100:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/46.6",
"product": {
"name": "vers:oracle/46.6",
"product_id": "CSAFPID-2698993",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE Element Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/5.1",
"product": {
"name": "vers:oracle/5.1",
"product_id": "CSAFPID-1839893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/5.2",
"product": {
"name": "vers:oracle/5.2",
"product_id": "CSAFPID-1839895",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Operations Monitor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.11",
"product": {
"name": "vers:oracle/12.11",
"product_id": "CSAFPID-1839890",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.0",
"product": {
"name": "vers:oracle/14.0",
"product_id": "CSAFPID-1839891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.0.0",
"product": {
"name": "vers:oracle/14.0.0",
"product_id": "CSAFPID-2699072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0",
"product": {
"name": "vers:oracle/15.0",
"product_id": "CSAFPID-1839961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0",
"product": {
"name": "vers:oracle/15.0.0",
"product_id": "CSAFPID-2699023",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1",
"product": {
"name": "vers:oracle/15.0.1",
"product_id": "CSAFPID-2699025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.2",
"product": {
"name": "vers:oracle/15.0.2",
"product_id": "CSAFPID-2699024",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications User Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0.0",
"product": {
"name": "vers:oracle/9.0.0.0",
"product_id": "CSAFPID-2698999",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Diameter Signaling Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2698996",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_cloud_engine:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-2699007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Data Analytics Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.5",
"product": {
"name": "vers:oracle/24.2.5",
"product_id": "CSAFPID-2699029",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0",
"product": {
"name": "vers:oracle/9.0.0",
"product_id": "CSAFPID-2699013",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.1",
"product": {
"name": "vers:oracle/9.0.1",
"product_id": "CSAFPID-2699012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.2",
"product": {
"name": "vers:oracle/9.0.2",
"product_id": "CSAFPID-2699016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.3",
"product": {
"name": "vers:oracle/9.0.3",
"product_id": "CSAFPID-2699015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2699098",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Element Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-1839960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Policy Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0",
"product": {
"name": "vers:oracle/9.0.0",
"product_id": "CSAFPID-2699093",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.1",
"product": {
"name": "vers:oracle/9.0.1",
"product_id": "CSAFPID-2699092",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.2",
"product": {
"name": "vers:oracle/9.0.2",
"product_id": "CSAFPID-2699091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.3",
"product": {
"name": "vers:oracle/9.0.3",
"product_id": "CSAFPID-2699090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2699124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Report Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.1.1.9",
"product": {
"name": "vers:oracle/9.1.1.9",
"product_id": "CSAFPID-2698959",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sd-wan_edge:9.1.1.9:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle SD-WAN Edge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/22.4.0",
"product": {
"name": "vers:oracle/22.4.0",
"product_id": "CSAFPID-2699181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/23.4.4",
"product": {
"name": "vers:oracle/23.4.4",
"product_id": "CSAFPID-1839930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.1",
"product": {
"name": "vers:oracle/24.1.1",
"product_id": "CSAFPID-1839933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-1839963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/25.1.100",
"product": {
"name": "vers:oracle/25.1.100",
"product_id": "CSAFPID-2698956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:25.1.100:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
"product": {
"name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
"product_id": "CSAFPID-2699180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0-23.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/10.0.0",
"product": {
"name": "vers:oracle/10.0.0",
"product_id": "CSAFPID-2699083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.2.0",
"product": {
"name": "vers:oracle/9.2.0",
"product_id": "CSAFPID-1839887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.3.0",
"product": {
"name": "vers:oracle/9.3.0",
"product_id": "CSAFPID-1839889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/4.1.0",
"product": {
"name": "vers:oracle/4.1.0",
"product_id": "CSAFPID-1839888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/4.2.0",
"product": {
"name": "vers:oracle/4.2.0",
"product_id": "CSAFPID-1839886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Communications Broker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1839925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1840027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2699041",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
"product": {
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
"product_id": "CSAFPID-2698961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0-24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Analytics Data Director"
}
],
"category": "product_family",
"name": "Oracle Communications"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
"product_id": "CSAFPID-1145869"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
"product_id": "CSAFPID-1145271",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
"product_id": "CSAFPID-1173947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
"product_id": "CSAFPID-1145868"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
"product_id": "CSAFPID-1145270",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
"product_id": "CSAFPID-1173946",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.3",
"product": {
"name": "vers:oracle/23.4.3",
"product_id": "CSAFPID-1173942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.2",
"product": {
"name": "vers:oracle/23.4.2",
"product_id": "CSAFPID-1173940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.4",
"product": {
"name": "vers:oracle/23.4.4",
"product_id": "CSAFPID-1173965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1173967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.2",
"product": {
"name": "vers:oracle/23.4.2",
"product_id": "CSAFPID-1173943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1145265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1145273",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1174046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.3.6",
"product": {
"name": "vers:oracle/7.3.6",
"product_id": "CSAFPID-2699077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.0",
"product": {
"name": "vers:oracle/7.4.0",
"product_id": "CSAFPID-2699075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-2699076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.5.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Integrity"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/6.0",
"product": {
"name": "vers:oracle/6.0",
"product_id": "CSAFPID-2699027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
"product": {
"name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
"product_id": "CSAFPID-1839852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
"product": {
"name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
"product_id": "CSAFPID-1840033",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0|\u003c=6.1",
"product": {
"name": "vers:oracle/\u003e=6.0|\u003c=6.1",
"product_id": "CSAFPID-2698955",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0-6.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.0.0.8.0",
"product": {
"name": "vers:oracle/12.0.0.8.0",
"product_id": "CSAFPID-2699001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product_id": "CSAFPID-2699058",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
"product_id": "CSAFPID-1839957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
"product": {
"name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
"product_id": "CSAFPID-2699000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0-15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
"product": {
"name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
"product_id": "CSAFPID-1839953",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Billing and Revenue Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.26.0",
"product": {
"name": "vers:oracle/8.1.0.26.0",
"product_id": "CSAFPID-2698964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/6.3.1",
"product": {
"name": "vers:oracle/6.3.1",
"product_id": "CSAFPID-2698991",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications MetaSolv Solution"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.0.6.0.0",
"product": {
"name": "vers:oracle/12.0.6.0.0",
"product_id": "CSAFPID-2699127",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699128",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Charging and Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.4.0",
"product": {
"name": "vers:oracle/7.4.0",
"product_id": "CSAFPID-1839980",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-1840004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.1",
"product": {
"name": "vers:oracle/7.4.1",
"product_id": "CSAFPID-1839981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699056",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product_id": "CSAFPID-2699060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Pricing Design Center"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.0.0.3",
"product": {
"name": "vers:oracle/8.0.0.3",
"product_id": "CSAFPID-1839921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.0.0.4.0",
"product": {
"name": "vers:oracle/8.0.0.4.0",
"product_id": "CSAFPID-2698975",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.1",
"product": {
"name": "vers:oracle/8.1.0.1",
"product_id": "CSAFPID-1839922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.2.0",
"product": {
"name": "vers:oracle/8.1.0.2.0",
"product_id": "CSAFPID-2698974",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Service Catalog and Design"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.4.1",
"product": {
"name": "vers:oracle/7.4.1",
"product_id": "CSAFPID-1839978",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.2",
"product": {
"name": "vers:oracle/7.4.2",
"product_id": "CSAFPID-1839979",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-2699035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.1",
"product": {
"name": "vers:oracle/7.5.1",
"product_id": "CSAFPID-1839983",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.6.0",
"product": {
"name": "vers:oracle/7.6.0",
"product_id": "CSAFPID-1840005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.7.0",
"product": {
"name": "vers:oracle/7.7.0",
"product_id": "CSAFPID-2699034",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
"product": {
"name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
"product_id": "CSAFPID-2699036",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0-7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
"product": {
"name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
"product_id": "CSAFPID-2699096",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0-7.5.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Inventory Management"
}
],
"category": "product_family",
"name": "Oracle Communications Applications"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1145246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1145247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:semver/7.4.0",
"product": {
"name": "vers:semver/7.4.0",
"product_id": "CSAFPID-2698653"
}
},
{
"category": "product_version_range",
"name": "vers:semver/7.4.1",
"product": {
"name": "vers:semver/7.4.1",
"product_id": "CSAFPID-2698654"
}
},
{
"category": "product_version_range",
"name": "vers:semver/7.5.0",
"product": {
"name": "vers:semver/7.5.0",
"product_id": "CSAFPID-2698655"
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
}
],
"category": "vendor",
"name": "Oracle Corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5388",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5388",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5388.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-5388"
},
{
"cve": "CVE-2023-5685",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5685",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-49582",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49582",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-49582"
},
{
"cve": "CVE-2023-51074",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-51074"
},
{
"cve": "CVE-2024-1135",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-1135"
},
{
"cve": "CVE-2024-4227",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4227",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4227.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-4227"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6763",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
}
],
"title": "CVE-2024-6763"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-12797",
"cwe": {
"id": "CWE-392",
"name": "Missing Report of Error Condition"
},
"notes": [
{
"category": "other",
"text": "Missing Report of Error Condition",
"title": "CWE-392"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12797",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12797.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-12797"
},
{
"cve": "CVE-2024-12798",
"cwe": {
"id": "CWE-917",
"name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
"title": "CWE-917"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12798",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12798.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-12798"
},
{
"cve": "CVE-2024-21538",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21538",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21538.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-21538"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-28168",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28168",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28168"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-31141",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31141",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31141.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-31141"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-40896",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-40896"
},
{
"cve": "CVE-2024-43044",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-43709",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43709.json"
}
],
"title": "CVE-2024-43709"
},
{
"cve": "CVE-2024-43796",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43796",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-43796"
},
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-47072"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52046",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-52046"
},
{
"cve": "CVE-2024-52303",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52303",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52303.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-52303"
},
{
"cve": "CVE-2024-53122",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53122",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53122.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-53122"
},
{
"cve": "CVE-2024-56128",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "other",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56128",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-56128"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-1974",
"cwe": {
"id": "CWE-653",
"name": "Improper Isolation or Compartmentalization"
},
"notes": [
{
"category": "other",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-1974"
},
{
"cve": "CVE-2025-23084",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23084",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23084.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-23084"
},
{
"cve": "CVE-2025-23184",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json"
}
],
"title": "CVE-2025-23184"
},
{
"cve": "CVE-2025-24813",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24813",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24813"
},
{
"cve": "CVE-2025-24928",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24928",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24928.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24928"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24970"
},
{
"cve": "CVE-2025-27516",
"cwe": {
"id": "CWE-1336",
"name": "Improper Neutralization of Special Elements Used in a Template Engine"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements Used in a Template Engine",
"title": "CWE-1336"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27516",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27516.json"
}
],
"title": "CVE-2025-27516"
},
{
"cve": "CVE-2025-27789",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27789",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-27789"
},
{
"cve": "CVE-2025-30729",
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30729",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30729.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-30729"
},
{
"cve": "CVE-2025-31721",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31721",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31721.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-31721"
}
]
}
ncsc-2025-0382
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Building X, COMOS, Energy Services, Gridscale X, NX, RUGGEDCOM, SICAM, SIMATIC, SINEC, SINEMA, SIPLUS en Solid Edge.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- (Remote) code execution (root/admin rechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Verhogen van rechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)",
"title": "CWE-96"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "Improper Removal of Sensitive Information Before Storage or Transfer",
"title": "CWE-212"
},
{
"category": "general",
"text": "CWE-264",
"title": "CWE-264"
},
{
"category": "general",
"text": "Privilege Chaining",
"title": "CWE-268"
},
{
"category": "general",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Improper Preservation of Permissions",
"title": "CWE-281"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Generation of Predictable Numbers or Identifiers",
"title": "CWE-340"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Improperly Implemented Security Check for Standard",
"title": "CWE-358"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Session Fixation",
"title": "CWE-384"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "CWE-399",
"title": "CWE-399"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Missing Lock Check",
"title": "CWE-414"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Initialization",
"title": "CWE-665"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Release of Invalid Pointer or Reference",
"title": "CWE-763"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Missing Initialization of Resource",
"title": "CWE-909"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "general",
"text": "CWE-1214",
"title": "CWE-1214"
},
{
"category": "general",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-202008.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-212953.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-356310.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-416652.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-420375.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-471761.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-626856.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-710408.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-734261.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-763474.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-868571.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-882673.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-912274.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-915282.html"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-12-09T13:15:05.391966Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0382",
"initial_release_date": "2025-12-09T13:15:05.391966Z",
"revision_history": [
{
"date": "2025-12-09T13:15:05.391966Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Building X - Security Manager Edge Controller (ACC-AP)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "COMOS V10.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "COMOS V10.4.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "COMOS V10.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "COMOS V10.5.2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "COMOS V10.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Energy Services"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Gridscale X Prepay"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "NX V2412"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "NX V2506"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "SICAM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU DIQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU PA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "SIMATIC CN 4100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200AL IM 157-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "SIMATIC PN/PN Coupler"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "SIMATIC S7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "SINEC INS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "SINEC NMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "SINEC PNI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "SIPLUS HCS4200 CIM4210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "SIPLUS NET PN/PN Coupler"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1212 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1214 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1215 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1500 CPU 1511-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-300 CPU 314C-2 PN/DP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2025"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2026"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7169",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "other",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "description",
"text": "A vulnerability in shadow 4.5\u0027s newgidmap allows unprivileged users to exploit user namespaces, potentially bypassing access restrictions set by administrators.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-7169 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-7169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-7169"
},
{
"cve": "CVE-2018-9234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "GnuPG versions 2.2.4 and 2.2.5 have a vulnerability (CVE-2018-9234) that allows remote attackers to bypass security restrictions by using a signing subkey for key certification without enforcing the offline master Certify key.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-9234 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-9234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-9234"
},
{
"cve": "CVE-2018-12934",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "The \u0027remember_Ktype\u0027 function in cplus-dem.c of GNU libiberty, present in GNU Binutils 2.30, is susceptible to excessive memory consumption, which may result in out-of-memory conditions during cxxfilt execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-12934 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-12934.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-12934"
},
{
"cve": "CVE-2019-9893",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"notes": [
{
"category": "other",
"text": "Improperly Implemented Security Check for Standard",
"title": "CWE-358"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "description",
"text": "The libseccomp 2.4.1 update resolves a BPF generation bug, enhances syscall tables, addresses CVE-2019-9893, and improves support for various architectures while fixing prior 64-bit syscall argument comparison issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-9893 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-9893.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-9893"
},
{
"cve": "CVE-2019-12900",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "CWE-1214",
"title": "CWE-1214"
},
{
"category": "description",
"text": "The updates for ClamAV version 0.103.0 and bzip2 address multiple security vulnerabilities, including non-blocking database reloads in ClamAV and out-of-bounds writes in bzip2, enhancing overall functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-12900 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-12900.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-12900"
},
{
"cve": "CVE-2019-14866",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Versions of cpio prior to 2.13 have a vulnerability due to improper input validation when generating TAR archives, allowing unauthorized file permissions and paths that could compromise systems upon extraction by high-privilege users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14866.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-14866"
},
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and its components, including json-c and libfastjson, have multiple vulnerabilities, particularly an integer overflow and out-of-bounds write issue (CVE-2020-12762) affecting large JSON files, allowing potential arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-12762 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-12762.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-21047",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "The libcpu component of elfutils version 0.177 has a denial-of-service vulnerability that can be exploited by attackers through specially crafted ELF files, leading to application crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-21047 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-21047.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-21047"
},
{
"cve": "CVE-2020-22217",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "C-ares versions before 1.16.1 and up to 1.17.0 have a buffer overflow vulnerability in the ares_parse_soa_reply function, addressed by the libcares2 update for CVE-2020-22217.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-22217 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-22217.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-22217"
},
{
"cve": "CVE-2020-35525",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "A NULL pointer dereference vulnerability in SQLite 3.31.1 can cause out-of-memory errors during INTERSECT query processing, potentially leading to Denial of Service attacks in affected NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-35525 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-35525.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-35525"
},
{
"cve": "CVE-2021-35550",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "description",
"text": "Recent updates for OpenJDK versions 1.7, 1.8, and 11 address multiple vulnerabilities related to TLS ciphers, memory allocation, and keystore corruption, while Oracle Java SE and GraalVM have critical vulnerabilities allowing unauthorized access to sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35550 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35550.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35550"
},
{
"cve": "CVE-2021-35556",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Recent updates for various Java versions, including IBM and OpenJDK, address multiple vulnerabilities related to memory allocation, weak cipher preferences, and denial of service risks, while enhancing functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35556 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35556.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35556"
},
{
"cve": "CVE-2021-35559",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple updates for Java versions, including IBM and OpenJDK, address various vulnerabilities such as memory allocation issues and weak cipher preferences, while also enhancing functionalities and updating to newer service refreshes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35559 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35559"
},
{
"cve": "CVE-2021-35561",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Recent updates for OpenJDK and Oracle Java SE address multiple vulnerabilities, including weak TLS ciphers, excessive memory allocations, and denial of service risks across various versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35561 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35561"
},
{
"cve": "CVE-2021-35564",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Multiple updates for IBM and OpenJDK Java versions address various vulnerabilities, including excessive memory allocation and weak cipher preferences, while also enhancing functionality and security across several releases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35564 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35564.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35564"
},
{
"cve": "CVE-2021-35565",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Recent updates for various Java versions, including IBM and OpenJDK, address multiple vulnerabilities related to memory allocation, weak cipher preferences, and denial of service risks, while enhancing functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35565 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35565.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35565"
},
{
"cve": "CVE-2021-35567",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "Recent updates for Java, including OpenJDK and Oracle Java SE, address multiple vulnerabilities related to memory allocation, TLS issues, and unauthorized access, with CVSS scores indicating significant risks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35567 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35567.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35567"
},
{
"cve": "CVE-2021-35578",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Recent updates for Java SE, OpenJDK, and Oracle GraalVM address multiple vulnerabilities, including memory allocation issues, weak TLS ciphers, and denial of service risks, affecting various supported versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35578 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35578.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35578"
},
{
"cve": "CVE-2021-35586",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple updates for Java versions, including IBM and OpenJDK, address various vulnerabilities such as excessive memory allocation and weak cipher preferences, while also enhancing functionality and security across several versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35586 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35586.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35586"
},
{
"cve": "CVE-2021-35588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for IBM Java and OpenJDK address multiple vulnerabilities, including memory allocation issues and weak cipher preferences, while also enhancing versions to Java 7.1 SR5, Java 8.0 SR7, and OpenJDK 8u312 and 7u321.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35588 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35588.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35588"
},
{
"cve": "CVE-2021-35603",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for OpenJDK versions 1.7, 1.8, and 11 address multiple vulnerabilities, including TLS cipher issues and memory allocation problems, while Oracle Java SE and GraalVM Enterprise Edition have vulnerabilities that could compromise data confidentiality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35603 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35603"
},
{
"cve": "CVE-2021-36084",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including use-after-free and Denial of Service risks, potentially allowing attackers to execute arbitrary code or cause service disruptions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36084 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36084.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36084"
},
{
"cve": "CVE-2021-36085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution risks, affecting various components and products, particularly those utilizing SELinux.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36085 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36085"
},
{
"cve": "CVE-2021-36086",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution, affecting various components and requiring user interaction or elevated privileges for exploitation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36086 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36086.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36086"
},
{
"cve": "CVE-2021-36087",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution risks, affecting various components and requiring user interaction or elevated privileges for exploitation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36087 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36087.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36087"
},
{
"cve": "CVE-2021-38185",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "GNU cpio version 2.13 is vulnerable to remote code execution due to an integer overflow in the ds_fgetstr function when processing specially crafted pattern files.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-38185 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-38185.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-38185"
},
{
"cve": "CVE-2021-47358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP4 and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks and use-after-free issues, across various kernel versions and components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-47358 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-47358.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-47358"
},
{
"cve": "CVE-2021-47361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 12 and 15 SP5 kernels, including RT and Azure variants, were updated to address multiple security vulnerabilities such as memory leaks and use-after-free issues, enhancing overall system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-47361 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-47361.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-47361"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels and Linux Kernel versions have been updated to address multiple security vulnerabilities, including memory corruption, race conditions, and remote stack overflow issues, alongside various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0435 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0435.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels and Linux Kernel versions addressed multiple security vulnerabilities, including privilege escalation, memory corruption, and transient execution side-channel attacks across several service packs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0492 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0492"
},
{
"cve": "CVE-2022-0847",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "other",
"text": "Missing Initialization of Resource",
"title": "CWE-909"
},
{
"category": "other",
"text": "Improper Initialization",
"title": "CWE-665"
},
{
"category": "other",
"text": "Improper Preservation of Permissions",
"title": "CWE-281"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including privilege escalation and memory access issues, alongside mitigations for transient execution side-channel attacks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0847 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0847.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise kernels (12 SP2, SP3, SP4, SP5, and 15 SP1, SP3) were updated to address various security vulnerabilities, including memory leaks, use-after-free, double free issues, and information leak flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0850 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0850.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0850"
},
{
"cve": "CVE-2022-1353",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"notes": [
{
"category": "other",
"text": "Improper Removal of Sensitive Information Before Storage or Transfer",
"title": "CWE-212"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Multiple updates were released for SUSE Linux Enterprise kernels addressing various security vulnerabilities and non-security bugs, including memory management issues, privilege escalation risks, and access control flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1353 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-1353.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1734",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across multiple versions have been updated to address various security vulnerabilities, including RETBLEED, use-after-free issues, and non-security bug fixes, enhancing overall system stability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1734 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-1734.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernel updates across various versions address multiple security vulnerabilities, including race conditions, use-after-free issues, and denial of service, alongside non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2639 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-2639.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels addressed multiple security vulnerabilities, including use-after-free and memory corruption issues, across several versions and components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2964 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-2964.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3424",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels and Linux Kernel versions addressed multiple critical security vulnerabilities, including use-after-free and memory corruption issues, across several components and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-3424 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-3424.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-20141",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across SUSE Linux Enterprise and Linux Kernel versions addressed various security vulnerabilities, including buffer overflows, use-after-free issues, and the RETBLEED attack, alongside non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-20141 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-20141.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-23039",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, buffer overflows, and double free issues, alongside numerous non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23039 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-23039.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-23039"
},
{
"cve": "CVE-2022-23040",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, buffer overflows, and double free issues, alongside numerous non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23040 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-23040.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-23040"
},
{
"cve": "CVE-2022-24958",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "other",
"text": "Release of Invalid Pointer or Reference",
"title": "CWE-763"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to SUSE Linux Enterprise kernels and Google Android address multiple security vulnerabilities, including privilege escalations and memory leaks, while NetApp products face risks from flaws in Linux Kernel versions up to 5.16.8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-24958 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-24958.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-24958"
},
{
"cve": "CVE-2022-27223",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP3 and RT kernels were updated to address multiple security vulnerabilities, including CVEs for memory leaks, privilege escalations, and a specific out-of-array access issue in the udc-xilinx driver.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-27223 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-27223.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-27223"
},
{
"cve": "CVE-2022-28390",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise kernels (12 SP2, SP3, SP4, SP5, and 15 SP1, SP3) and various Linux Kernel versions were updated to address multiple security vulnerabilities, including memory leaks, use-after-free, and double free issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-28390 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-28390.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-29872",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated attackers to exploit improper validation of POST request parameters, potentially leading to denial of service or arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29872 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29872.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29872"
},
{
"cve": "CVE-2022-29873",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM T devices (versions \u003c V3.0) allows unauthenticated attackers to exploit improper validation of GET and POST request parameters, leading to potential denial of service or arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29873 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29873.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29873"
},
{
"cve": "CVE-2022-29874",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to capture unencrypted HTTP web traffic, potentially disrupting device functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29874 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29874"
},
{
"cve": "CVE-2022-29876",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit reflected XSS attacks due to improper handling of GET request parameters reflected in the web server response.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29876.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29876"
},
{
"cve": "CVE-2022-29878",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit unencrypted challenge-response communication, potentially gaining access to the device\u0027s management interface.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29878 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29878.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29878"
},
{
"cve": "CVE-2022-29879",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated users to access critical device information due to inadequate access protection in the web-based management interface.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29879 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29879.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29879"
},
{
"cve": "CVE-2022-29880",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated attackers to exploit improper input validation in the configuration interface, enabling persistent XSS attacks affecting logged-in users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29880 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29880.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29880"
},
{
"cve": "CVE-2022-29881",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated users to access internal configuration details due to inadequate access protection in the web-based management interface.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29881.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29881"
},
{
"cve": "CVE-2022-29882",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit improper file handling for XSS attacks, potentially enabling actions on behalf of legitimate users via error logs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29882 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29882.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29882"
},
{
"cve": "CVE-2022-29883",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Vulnerabilities in SICAM P850, P855, and T devices (all versions \u003c V3.00) allow unauthenticated access to web interface pages, enabling attackers to delete log files without authentication.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29883 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29883.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29883"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "description",
"text": "Recent kernel updates for SUSE Linux Enterprise and various Linux Kernel versions addressed multiple security vulnerabilities, including the RETBLEED attack, use-after-free issues, buffer overflows, and restriction bypasses related to the PT_SUSPEND_SECCOMP flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30594 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-30594.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-31807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "description",
"text": "Vulnerabilities in SiPass integrated AC5102 and ACC-AP devices allow local and remote attackers to upload or modify firmware due to inadequate integrity checks during firmware updates.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-31807 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-31807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-31807"
},
{
"cve": "CVE-2022-34903",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "GnuPGP has multiple vulnerabilities, including signature forgery and status injection issues, while recent updates to gpg2 and Docker images for Dagster-cloud and Spectrafit address these security concerns.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34903 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-34903.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "description",
"text": "The Linux kernel prior to version 5.18.13 contains a vulnerability in the block starting symbol (.bss) that may allow Xen PV guest OS users to perform denial of service attacks or escalate privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36123 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-36123.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-37032",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent updates for Quagga and FRRouting address multiple vulnerabilities, including sensitive information disclosure and denial of service risks due to BGP processing issues and out-of-bounds read vulnerabilities.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-37032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-37032"
},
{
"cve": "CVE-2022-37434",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "Recent updates to VLC, Oracle products, zlib, and Dagster-cloud address various vulnerabilities, including critical issues in Oracle systems and security fixes in zlib and opencv-python.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37434 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-37434.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-40226",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"notes": [
{
"category": "other",
"text": "Session Fixation",
"title": "CWE-384"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850, P855, and T devices allows session takeover due to the acceptance of user-defined session cookies without renewal after login/logout.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40226 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-40226.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-40226"
},
{
"cve": "CVE-2022-41665",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850, P855 (all versions \u003c V3.10) and SICAM T (all versions \u003c V3.0) devices allows unauthenticated attackers to execute arbitrary code or cause denial of service due to improper GET request parameter validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41665 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-41665.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-41665"
},
{
"cve": "CVE-2022-41858",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels addressed critical security vulnerabilities, including stack overflows, denial of service, memory leaks, and use-after-free issues, enhancing overall system stability and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41858 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-41858.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-43439",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in POWER METER models SICAM Q100, P850, P855, and T allows authenticated remote attackers to crash the device or execute arbitrary code due to improper validation of the Language-parameter in web interface requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-43439 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-43439.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-43439"
},
{
"cve": "CVE-2022-48624",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "description",
"text": "Red Hat OpenShift and multiple NetApp products have vulnerabilities in components like \u0027less\u0027, allowing local attackers to execute arbitrary commands, manipulate files, or disclose sensitive information due to improper handling of shell metacharacters.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48624 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48624.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48624"
},
{
"cve": "CVE-2022-48626",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5, 15 SP2, SP3, SP4, and SP5 were updated to address multiple security vulnerabilities, including use-after-free issues, memory leaks, and kernel panics.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48626 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48626.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48626"
},
{
"cve": "CVE-2022-48919",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, null pointer dereferences, and race conditions, with numerous CVEs resolved.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48919 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48919.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48919"
},
{
"cve": "CVE-2022-48926",
"cwe": {
"id": "CWE-414",
"name": "Missing Lock Check"
},
"notes": [
{
"category": "other",
"text": "Missing Lock Check",
"title": "CWE-414"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP3, SP4, and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks, race conditions, and null pointer dereferences, along with various non-security bug fixes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48926 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48926.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48926"
},
{
"cve": "CVE-2022-48948",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP4 and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks, use-after-free issues, and a buffer overflow in the USB gadget\u0027s setup handler.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48948"
},
{
"cve": "CVE-2022-48951",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5 and 15 SP4/SP5, including Azure and RT variants, received updates addressing multiple security vulnerabilities such as memory leaks and use-after-free issues, alongside driver-related fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48951 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48951.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48951"
},
{
"cve": "CVE-2022-48960",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels, including 15 SP5, 15 SP4, and 12 SP5, addressed critical security vulnerabilities such as use-after-free and memory leaks in network and display drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48960 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48960.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48960"
},
{
"cve": "CVE-2022-48962",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels (15 SP5, 15 SP4, 15 SP3, 15 SP2, 12 SP5) addressed critical security vulnerabilities, including use-after-free and memory leak issues in network and display components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48962"
},
{
"cve": "CVE-2022-48966",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP5 and 12 SP5 kernels received updates addressing multiple security vulnerabilities, including memory leaks, use-after-free issues, and out-of-bounds access across various components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48966 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48966.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48966"
},
{
"cve": "CVE-2022-48967",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including use-after-free issues and memory leaks in networking and display components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48967 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48967.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48967"
},
{
"cve": "CVE-2022-49058",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5 and 15 SP3 to SP5 have been updated to address multiple security vulnerabilities, including race conditions, buffer overflows, and memory management issues, alongside various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-49058 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-49058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-49058"
},
{
"cve": "CVE-2023-4641",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "other",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Recent updates address multiple vulnerabilities across various platforms, including Oracle Communications, Red Hat OpenShift, and shadow-utils, affecting user account management and potentially leading to unauthorized access and data leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4641 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4641.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-4641"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for Python 3.11 and earlier versions address multiple security vulnerabilities, particularly in email parsing and libexpat, alongside various non-security improvements and fixes for CVEs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28322",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Recent updates for macOS Ventura, Monterey, and Big Sur address multiple security vulnerabilities, while curl updates fix various flaws, including use-after-free and information disclosure issues, alongside a critical vulnerability in Oracle Enterprise Manager.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28322 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-28322.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-29383",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "The shadow update addresses CVE-2023-29383 related to /etc/shadow manipulation, resolves control character injection vulnerabilities in Shadow 4.13, and includes various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-29383.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29491",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent updates for macOS Ventura, Monterey, and Big Sur address critical vulnerabilities, while Oracle, Red Hat OpenShift, and ncurses have multiple security flaws that could lead to system compromise and denial-of-service conditions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29491 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-29491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-29491"
},
{
"cve": "CVE-2023-30901",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "description",
"text": "SICAM P850 and P855 devices (all versions \u003c V3.11) are vulnerable to Cross-Site Request Forgery attacks, allowing unauthorized actions via malicious links targeting authenticated users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-30901 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-30901.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-30901"
},
{
"cve": "CVE-2023-31238",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850 and P855 devices (all versions \u003c V3.11) allows attackers to impersonate legitimate users by exploiting missing cookie protection flags and accessing session tokens.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-31238 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-31238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-31238"
},
{
"cve": "CVE-2023-41358",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "The frr and quagga updates address multiple vulnerabilities, including issues with BGP attributes, zero-length NLRIs, and denial of service risks, enhancing overall stability and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-41358 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-41358.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-41358"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Communications products, curl, and Siemens products allow unauthorized access, data manipulation, and potential Denial-of-Service, with CVSS scores of 6.5 for specific Oracle vulnerabilities.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46753",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "The FRRouting 8.5.6 update addresses multiple vulnerabilities, including crashes from crafted BGP UPDATE messages and malformed MP_REACH_NLRI data, while enhancing PIM/PIMv6/BGP and VRF support.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46753 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46753.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-46753"
},
{
"cve": "CVE-2023-47234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "The frr 8.5.6 update addresses multiple vulnerabilities in BGP UPDATE processing, including denial-of-service issues and crashes from malformed messages and improper attribute handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-47234 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-47234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-47234"
},
{
"cve": "CVE-2024-0397",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Recent updates for Python interpreters and Oracle Database Server address multiple security vulnerabilities, including denial of service risks and memory race conditions, alongside various bug fixes and enhancements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to Python address multiple security vulnerabilities, including buffer overreads and email header injection, affecting versions up to 3.9 and impacting various NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5642 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-5642.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-5642"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Recent updates to various Python versions address multiple vulnerabilities, including denial of service and excessive resource consumption, particularly in the tarfile and http.cookies modules, alongside Oracle Database patches for significant vulnerabilities.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "Recent updates for various Python versions, including venv-salt-minion, address multiple security vulnerabilities, particularly email header injection and resource consumption issues, alongside numerous bug fixes and enhancements.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6923 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6923.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Recent updates for Python 3.x and Oracle products address multiple security vulnerabilities, including denial of service, excessive resource consumption, and email header injection, with varying severity levels across different versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Multiple vulnerabilities in curl and Oracle products, including credential leakage and unauthorized data access, affect various versions of software, notably impacting cURL and Oracle Communications Unified Assurance.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-11168",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Recent updates for Python address CVE-2024-11168, fixing improper validation of IPv6 and IPvFuture addresses, and resolving vulnerabilities in the `urllib.parse.urlsplit()` and `urlparse()` functions that could lead to SSRF exploits.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11168 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-11168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-11168"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Cloud Native Core Policy, and GNU libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-12243",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "A flaw in GnuTLS related to inefficient DER decoding in libtasn1 can lead to denial-of-service conditions, affecting multiple NetApp products and identified as CVE-2024-12243.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12243 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-12243"
},
{
"cve": "CVE-2024-28085",
"cwe": {
"id": "CWE-268",
"name": "Privilege Chaining"
},
"notes": [
{
"category": "other",
"text": "Privilege Chaining",
"title": "CWE-268"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "The util-linux update addresses critical vulnerabilities, particularly in the \u0027wall\u0027 command, neutralizing escape sequences to prevent account takeover and other potential exploits in versions up to 2.40.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28085 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-32487",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)",
"title": "CWE-96"
},
{
"category": "description",
"text": "The Less text file viewer has an OS command execution vulnerability due to mishandled newline characters in file names, affecting multiple NetApp products and allowing remote command execution when the LESSOPEN variable is set.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32487 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-32487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-47875",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "DOMPurify has addressed a nesting-based mXSS vulnerability in versions 2.5.0 and 3.1.3, while HPE Private Cloud AI has identified remote exploit vulnerabilities.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47875 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47875.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-47875"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Communications Cloud Native Core services and libexpat allow unauthenticated denial of service attacks, with CVSS scores of 5.9, affecting various versions and components.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52533",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and Gnome Glib versions prior to 2.82.1 expose systems to unauthorized access and buffer overflow risks, potentially leading to data compromise and service disruptions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52533 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-52533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-52533"
},
{
"cve": "CVE-2024-56835",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II (versions \u003c V2.17.0) allows code injection in the DHCP Server configuration file, enabling attackers to gain root access via a reverse shell.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56835"
},
{
"cve": "CVE-2024-56836",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II family versions prior to V2.17.0 allows attackers to inject parameters during Dynamic DNS configuration, potentially leading to root access via a reverse shell.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56836 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56836.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56836"
},
{
"cve": "CVE-2024-56837",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "description",
"text": "A vulnerability in the RUGGEDCOM ROX II family (versions \u003c V2.17.0) allows attackers to gain root access through insufficient validation during configuration file handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56837 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56837.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56837"
},
{
"cve": "CVE-2024-56838",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II devices (versions \u003c V2.17.0) allows attackers to execute arbitrary code as root due to the SCEP client\u0027s failure to validate multiple fields during secure certificate enrollment.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56838 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56838.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56838"
},
{
"cve": "CVE-2024-56839",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II (versions \u003c V2.17.0) allows code injection via VRF, enabling attackers to execute arbitrary code with root privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56839 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56839.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56839"
},
{
"cve": "CVE-2024-56840",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in the RUGGEDCOM ROX II family (versions \u003c V2.17.0) allows code injection via IPsec, enabling attackers to execute arbitrary code with root privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56840 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56840.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56840"
},
{
"cve": "CVE-2025-0938",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6, 3.11, 3.12, and 3.13.5 address security vulnerabilities related to improper URL parsing of domain names with square brackets, which violate RFC 3986 and could lead to unauthorized data manipulation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0938 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0938.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-0938"
},
{
"cve": "CVE-2025-2783",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Palo Alto Networks has addressed vulnerabilities in Prisma\u00ae Access Browser and highlighted a high-severity sandbox escape flaw in Google Chrome on Windows, linked to an incorrect handle in Mojo.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/AU:N/R:U/V:D/RE:L/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-2783 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-2783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-2783"
},
{
"cve": "CVE-2025-10148",
"cwe": {
"id": "CWE-340",
"name": "Generation of Predictable Numbers or Identifiers"
},
"notes": [
{
"category": "other",
"text": "Generation of Predictable Numbers or Identifiers",
"title": "CWE-340"
},
{
"category": "description",
"text": "Recent updates to curl (version 8.14.1) address critical security vulnerabilities, including cache poisoning risks in WebSocket code and a denial of service flaw in Oracle Communications Unified Inventory Management.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-10148 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-10148.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-10148"
},
{
"cve": "CVE-2025-40800",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "description",
"text": "A vulnerability in various versions of COMOS, NX, Simcenter 3D, Simcenter Femap, and Solid Edge products allows for potential man-in-the-middle attacks due to the IAM client not validating server certificates for TLS connections.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40800 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40800.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40800"
},
{
"cve": "CVE-2025-40801",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "description",
"text": "A vulnerability in COMOS, NX, Simcenter, and Tecnomatix products arises from the SALT SDK\u0027s failure to validate server certificates for TLS connections, risking man-in-the-middle attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40801 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40801"
},
{
"cve": "CVE-2025-40806",
"cwe": {
"id": "CWE-204",
"name": "Observable Response Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "description",
"text": "A vulnerability in Gridscale X Prepay (versions \u003c V4.2.1) allows unauthenticated remote attackers to perform user enumeration, potentially facilitating brute force attacks on valid users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40806 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40806.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40806"
},
{
"cve": "CVE-2025-40807",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "description",
"text": "A vulnerability in Gridscale X Prepay (versions \u003c V4.2.1) allows locked-out users to exploit capture-replay of authentication tokens, enabling them to establish valid sessions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40807 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40807"
},
{
"cve": "CVE-2025-40818",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "description",
"text": "A vulnerability in SINEMA Remote Connect Server (versions \u003c V3.2 SP4) allows unauthorized access to private SSL/TLS keys, enabling attackers to impersonate the server and conduct man-in-the-middle attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40818 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40818.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40818"
},
{
"cve": "CVE-2025-40819",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "A vulnerability in SINEMA Remote Connect Server (versions \u003c V3.2 SP4) allows unauthorized modification of the system_ticketinfo table, enabling database users to bypass licensing restrictions and modify database values directly.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40819 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40819"
},
{
"cve": "CVE-2025-40820",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "description",
"text": "The document outlines a vulnerability in certain products that lack TCP sequence number validation, enabling unauthenticated remote attackers to disrupt TCP-based services through the injection of spoofed IP packets.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40820 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40820"
},
{
"cve": "CVE-2025-40830",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "description",
"text": "A vulnerability in SINEC Security Monitor (versions \u003c V4.10.0) allows lowly privileged authenticated local attackers to read or write any file on the server or sensor due to inadequate authorization checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40830 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40830.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40830"
},
{
"cve": "CVE-2025-40831",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in SINEC Security Monitor versions prior to V4.10.0 allows lowly privileged authenticated attackers to exploit input validation issues in the date parameter during report generation, potentially causing a denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40831 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40831.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40831"
},
{
"cve": "CVE-2025-40935",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM devices (versions below V5.10.1) allows authenticated remote attackers to exploit improper input validation during TLS certificate uploads, potentially leading to device crashes and Denial of Service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40935 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40935.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40935"
},
{
"cve": "CVE-2025-40938",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) exposes sensitive firmware information, compromising the device\u0027s confidentiality, integrity, and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40938 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40938.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40938"
},
{
"cve": "CVE-2025-40939",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) allows an attacker with physical access to exploit an unauthenticated USB port, potentially causing a denial of service by triggering a reboot.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40939 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40939.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40939"
},
{
"cve": "CVE-2025-40940",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) leads to inconsistent SNMP behavior, potentially allowing unauthorized access to sensitive data and compromising confidentiality.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40940 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40940.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40940"
},
{
"cve": "CVE-2025-40941",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (all versions \u003c V4.0.1) allows affected devices to expose server information in their responses, potentially aiding attackers with network access in targeted attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40941 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40941.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40941"
},
{
"cve": "CVE-2025-59392",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "description",
"text": "Elspec G5 devices up to version 1.2.2.19 have a vulnerability that allows physical access to reset the Admin password using a USB drive with a specific reset string.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59392 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59392.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-59392"
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "The update for binutils version 2.32 addresses multiple security vulnerabilities, including memory access issues and buffer overflows, while also introducing support for new architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-1000876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-1000876.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-1000876"
}
]
}
ncsc-2025-0123
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Oracle Database Producten en subsystemen, zoals Oracle Server, NoSQL, TimesTen, Secure Backup en Essbase.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om een Denial-of-Service te veroorzaken of om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en gegevens te manipuleren. Subcomponenten als de RDBMS Listener, Java VM, en andere componenten zijn specifiek kwetsbaar, met CVSS-scores vari\u00ebrend van 5.3 tot 7.5, wat duidt op een gematigd tot hoog risico.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "general",
"text": "Sensitive Information in Resource Not Removed Before Reuse",
"title": "CWE-226"
},
{
"category": "general",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Unprotected Transport of Credentials",
"title": "CWE-523"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
"title": "CWE-614"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database Producten",
"tracking": {
"current_release_date": "2025-04-16T08:37:39.412900Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0123",
"initial_release_date": "2025-04-16T08:37:39.412900Z",
"revision_history": [
{
"date": "2025-04-16T08:37:39.412900Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/22.1",
"product": {
"name": "vers:unknown/22.1",
"product_id": "CSAFPID-1304603"
}
}
],
"category": "product_name",
"name": "Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13.5.0.0",
"product": {
"name": "vers:unknown/13.5.0.0",
"product_id": "CSAFPID-1201359"
}
}
],
"category": "product_name",
"name": "Enterprise Manager for Oracle Database"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
"product": {
"name": "vers:unknown/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
"product_id": "CSAFPID-2698376"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=21.3|\u003c=21.17",
"product": {
"name": "vers:unknown/\u003e=21.3|\u003c=21.17",
"product_id": "CSAFPID-2698377"
}
}
],
"category": "product_name",
"name": "GoldenGate"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.1",
"product": {
"name": "vers:oracle/23.1",
"product_id": "CSAFPID-1238473"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2.0",
"product": {
"name": "vers:unknown/2.0",
"product_id": "CSAFPID-1237753"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/20.2",
"product": {
"name": "vers:unknown/20.2",
"product_id": "CSAFPID-1238475"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/23.1",
"product": {
"name": "vers:unknown/23.1",
"product_id": "CSAFPID-1296375"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1237603"
}
}
],
"category": "product_name",
"name": "Big Data Spatial and Graph"
}
],
"category": "product_family",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.3|\u003c=19.22",
"product": {
"name": "vers:oracle/\u003e=19.3|\u003c=19.22",
"product_id": "CSAFPID-1145825"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.3|\u003c=21.13",
"product": {
"name": "vers:oracle/\u003e=21.3|\u003c=21.13",
"product_id": "CSAFPID-1145826"
}
}
],
"category": "product_name",
"name": "Oracle Database Server"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.3|\u003c=19.26",
"product": {
"name": "vers:oracle/\u003e=19.3|\u003c=19.26",
"product_id": "CSAFPID-2698969",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.3|\u003c=21.17",
"product": {
"name": "vers:oracle/\u003e=21.3|\u003c=21.17",
"product_id": "CSAFPID-2698968",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.4|\u003c=21.16",
"product": {
"name": "vers:oracle/\u003e=21.4|\u003c=21.16",
"product_id": "CSAFPID-1839905",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_workload_manager:21.4-21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4|\u003c=23.7",
"product": {
"name": "vers:oracle/\u003e=23.4|\u003c=23.7",
"product_id": "CSAFPID-2698934",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.7:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Database Server"
}
],
"category": "product_family",
"name": "Oracle Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/13.5.0.0",
"product": {
"name": "vers:oracle/13.5.0.0",
"product_id": "CSAFPID-1144644"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Manager for Oracle Database"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/1.5.0",
"product": {
"name": "vers:oracle/1.5.0",
"product_id": "CSAFPID-2699002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/1.6.0",
"product": {
"name": "vers:oracle/1.6.0",
"product_id": "CSAFPID-2699003",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/1.6.1",
"product": {
"name": "vers:oracle/1.6.1",
"product_id": "CSAFPID-2699004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.6.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle NoSQL Database"
}
],
"category": "product_family",
"name": "Oracle NoSQL Database"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=22.1.1.1.0|\u003c=22.1.1.30.0",
"product": {
"name": "vers:oracle/\u003e=22.1.1.1.0|\u003c=22.1.1.30.0",
"product_id": "CSAFPID-2699053",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:timesten_in-memory_database:22.1.1.1.0-22.1.1.30.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle TimesTen In-Memory Database"
}
],
"category": "product_family",
"name": "Oracle TimesTen In-Memory Database"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/25.1.0",
"product": {
"name": "vers:oracle/25.1.0",
"product_id": "CSAFPID-2698932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:25.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/25.2.0",
"product": {
"name": "vers:oracle/25.2.0",
"product_id": "CSAFPID-2698931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:25.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.8.0|\u003c=23.11.0",
"product": {
"name": "vers:oracle/\u003e=23.8.0|\u003c=23.11.0",
"product_id": "CSAFPID-2698930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.8.0-23.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.11.0",
"product": {
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.11.0",
"product_id": "CSAFPID-2698933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:24.1.0-24.11.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Autonomous Health Framework"
}
],
"category": "product_family",
"name": "Oracle Autonomous Health Framework"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/21.7.1.0.0",
"product": {
"name": "vers:oracle/21.7.1.0.0",
"product_id": "CSAFPID-2698943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.7.1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Essbase"
}
],
"category": "product_family",
"name": "Oracle Essbase"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.10",
"product": {
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.10",
"product_id": "CSAFPID-2698949",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.10:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "GoldenGate Stream Analytics"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
"product": {
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
"product_id": "CSAFPID-2698941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.26.0.0.250219:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.3|\u003c=21.17",
"product": {
"name": "vers:oracle/\u003e=21.3|\u003c=21.17",
"product_id": "CSAFPID-2698942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4|\u003c=23.7",
"product": {
"name": "vers:oracle/\u003e=23.4|\u003c=23.7",
"product_id": "CSAFPID-2699022",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:23.4-23.7:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle GoldenGate"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.18",
"product": {
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.18",
"product_id": "CSAFPID-1839977",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.3.0.0.0|\u003c=21.16.0.0.0",
"product": {
"name": "vers:oracle/\u003e=21.3.0.0.0|\u003c=21.16.0.0.0",
"product_id": "CSAFPID-1840034",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4|\u003c=23.6",
"product": {
"name": "vers:oracle/\u003e=23.4|\u003c=23.6",
"product_id": "CSAFPID-1840035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle GoldenGate Big Data and Application Adapters"
}
],
"category": "product_family",
"name": "Oracle GoldenGate"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.7",
"product": {
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.7",
"product_id": "CSAFPID-1144602"
}
}
],
"category": "product_name",
"name": "Oracle GoldenGate Stream Analytics"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003c23.1",
"product": {
"name": "vers:oracle/\u003c23.1",
"product_id": "CSAFPID-1145800"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2.0",
"product": {
"name": "vers:unknown/2.0",
"product_id": "CSAFPID-356315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ibm:oracle_big_data_spatial_and_graph:2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/23.1",
"product": {
"name": "vers:unknown/23.1",
"product_id": "CSAFPID-356152"
}
}
],
"category": "product_name",
"name": "Big Data Spatial and Graph"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.3",
"product": {
"name": "vers:oracle/23.4.3",
"product_id": "CSAFPID-2699065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2699066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/23.4.4",
"product": {
"name": "vers:oracle/23.4.4",
"product_id": "CSAFPID-1840017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.4.0",
"product": {
"name": "vers:oracle/24.4.0",
"product_id": "CSAFPID-1840013",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Graph Server and Client"
}
],
"category": "product_family",
"name": "Oracle Graph Server and Client"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003c=22.4.7",
"product": {
"name": "vers:oracle/\u003c=22.4.7",
"product_id": "CSAFPID-1145419",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:22.4.7_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003c=23.4.2",
"product": {
"name": "vers:oracle/\u003c=23.4.2",
"product_id": "CSAFPID-1145421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.2_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003c=24.1.0",
"product": {
"name": "vers:oracle/\u003c=24.1.0",
"product_id": "CSAFPID-1145422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.1.0_and_prior:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Graph Server and Client"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/3.0.6",
"product": {
"name": "vers:oracle/3.0.6",
"product_id": "CSAFPID-1145420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:big_data_spatial_and_graph:3.0.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Big Data Spatial and Graph"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.1.0.1",
"product": {
"name": "vers:oracle/12.1.0.1",
"product_id": "CSAFPID-2699109",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/12.1.0.2",
"product": {
"name": "vers:oracle/12.1.0.2",
"product_id": "CSAFPID-2699107",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/12.1.0.3",
"product": {
"name": "vers:oracle/12.1.0.3",
"product_id": "CSAFPID-2699106",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/18.1.0.0",
"product": {
"name": "vers:oracle/18.1.0.0",
"product_id": "CSAFPID-2699110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/18.1.0.1",
"product": {
"name": "vers:oracle/18.1.0.1",
"product_id": "CSAFPID-2698972",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/18.1.0.2",
"product": {
"name": "vers:oracle/18.1.0.2",
"product_id": "CSAFPID-2699108",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Secure Backup"
}
],
"category": "product_family",
"name": "Oracle Secure Backup"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:semver/19.3|\u003c=19.26",
"product": {
"name": "vers:semver/19.3|\u003c=19.26",
"product_id": "CSAFPID-2698485"
}
},
{
"category": "product_version_range",
"name": "vers:semver/21.3|\u003c=21.17",
"product": {
"name": "vers:semver/21.3|\u003c=21.17",
"product_id": "CSAFPID-2698486"
}
},
{
"category": "product_version_range",
"name": "vers:semver/23.4|\u003c=23.7",
"product": {
"name": "vers:semver/23.4|\u003c=23.7",
"product_id": "CSAFPID-2698487"
}
}
],
"category": "product_name",
"name": "Oracle Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:semver/12.1.0.1",
"product": {
"name": "vers:semver/12.1.0.1",
"product_id": "CSAFPID-2698463"
}
},
{
"category": "product_version_range",
"name": "vers:semver/12.1.0.2",
"product": {
"name": "vers:semver/12.1.0.2",
"product_id": "CSAFPID-2698464"
}
},
{
"category": "product_version_range",
"name": "vers:semver/12.1.0.3",
"product": {
"name": "vers:semver/12.1.0.3",
"product_id": "CSAFPID-2698465"
}
},
{
"category": "product_version_range",
"name": "vers:semver/18.1.0.0",
"product": {
"name": "vers:semver/18.1.0.0",
"product_id": "CSAFPID-2698466"
}
},
{
"category": "product_version_range",
"name": "vers:semver/18.1.0.1",
"product": {
"name": "vers:semver/18.1.0.1",
"product_id": "CSAFPID-2698467"
}
},
{
"category": "product_version_range",
"name": "vers:semver/18.1.0.2",
"product": {
"name": "vers:semver/18.1.0.2",
"product_id": "CSAFPID-2698468"
}
}
],
"category": "product_name",
"name": "Oracle Secure Backup"
}
],
"category": "vendor",
"name": "Oracle Corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-1935",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-1935",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1935.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-1935"
},
{
"cve": "CVE-2020-1938",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-1938",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1938.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-1938"
},
{
"cve": "CVE-2020-9484",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-9484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-9484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-9484"
},
{
"cve": "CVE-2020-11996",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-11996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-11996.json"
}
],
"title": "CVE-2020-11996"
},
{
"cve": "CVE-2020-13935",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13935",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13935.json"
}
],
"title": "CVE-2020-13935"
},
{
"cve": "CVE-2020-13943",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13943",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13943.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-13943"
},
{
"cve": "CVE-2020-36843",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-36843",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-36843.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-36843"
},
{
"cve": "CVE-2021-24122",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-24122",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-24122.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-24122"
},
{
"cve": "CVE-2021-25122",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-25122",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-25122.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-25122"
},
{
"cve": "CVE-2021-25329",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-25329",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-25329.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-25329"
},
{
"cve": "CVE-2021-30640",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-30640",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-30640.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-30640"
},
{
"cve": "CVE-2021-33037",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-33037",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-33037.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-33037"
},
{
"cve": "CVE-2021-41079",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-41079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-41079"
},
{
"cve": "CVE-2021-41184",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-41184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41184.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-41184"
},
{
"cve": "CVE-2021-42575",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-42575",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-42575.json"
}
],
"title": "CVE-2021-42575"
},
{
"cve": "CVE-2021-43980",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-43980",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43980.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-43980"
},
{
"cve": "CVE-2022-3786",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "other",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-3786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2022-3786"
},
{
"cve": "CVE-2022-25762",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"notes": [
{
"category": "other",
"text": "Sensitive Information in Resource Not Removed Before Reuse",
"title": "CWE-226"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-25762",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-25762.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2022-25762"
},
{
"cve": "CVE-2022-42252",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42252",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42252.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2022-42252"
},
{
"cve": "CVE-2023-28708",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Unprotected Transport of Credentials",
"title": "CWE-523"
},
{
"category": "other",
"text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
"title": "CWE-614"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28708",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28708.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-28708"
},
{
"cve": "CVE-2023-34053",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-34053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-34053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-34053"
},
{
"cve": "CVE-2023-41080",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-41080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41080.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-41080"
},
{
"cve": "CVE-2023-42795",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-42795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-42795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-42795"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45648",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45648",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45648.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-45648"
},
{
"cve": "CVE-2023-46589",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46589",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-46589"
},
{
"cve": "CVE-2024-6763",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
}
],
"title": "CVE-2024-6763"
},
{
"cve": "CVE-2024-8176",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8176",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8176.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-8176"
},
{
"cve": "CVE-2024-8184",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8184.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-8184"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-11233",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-11233"
},
{
"cve": "CVE-2024-11234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11234",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-11234"
},
{
"cve": "CVE-2024-11236",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11236.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-11236"
},
{
"cve": "CVE-2024-13176",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13176",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13176.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-13176"
},
{
"cve": "CVE-2024-23672",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23672",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-23672"
},
{
"cve": "CVE-2024-24549",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-36114",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36114",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36114.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-36114"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39338",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39338",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39338.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-39338"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-53382",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53382",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53382.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-53382"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-21578",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21578",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21578.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-21578"
},
{
"cve": "CVE-2025-24813",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24813",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-24813"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-24970"
},
{
"cve": "CVE-2025-25193",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25193",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-25193.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-25193"
},
{
"cve": "CVE-2025-26791",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-26791"
},
{
"cve": "CVE-2025-30694",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30694",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30694.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30694"
},
{
"cve": "CVE-2025-30701",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30701",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30701.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30701"
},
{
"cve": "CVE-2025-30702",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30702",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30702.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30702"
},
{
"cve": "CVE-2025-30733",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30733",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30733.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30733"
},
{
"cve": "CVE-2025-30736",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30736"
}
]
}
ncsc-2025-0128
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in verschillende producten, waaronder de Utilities Application Framework, WebLogic Server, en Fusion Middleware.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om toegang te krijgen tot kritieke gegevens, Denial-of-Service (DoS) te veroorzaken, en in sommige gevallen zelfs volledige controle over systemen te verkrijgen. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal vervaardigde verzoeken te sturen of door gebruik te maken van onveilige configuraties in de getroffen producten.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements Used in a Template Engine",
"title": "CWE-1336"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Fusion Middleware",
"tracking": {
"current_release_date": "2025-04-16T15:01:24.587426Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0128",
"initial_release_date": "2025-04-16T15:01:24.587426Z",
"revision_history": [
{
"date": "2025-04-16T15:01:24.587426Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-2699078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:access_manager:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Access Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1839842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.2.0.0",
"product": {
"name": "vers:oracle/14.1.2.0.0",
"product_id": "CSAFPID-2698989",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_process_management_suite:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Business Process Management Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1839864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.2.0.0",
"product": {
"name": "vers:oracle/14.1.2.0.0",
"product_id": "CSAFPID-2698967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:http_server:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle HTTP Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1839938",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.2.0.0",
"product": {
"name": "vers:oracle/14.1.2.0.0",
"product_id": "CSAFPID-2699074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:managed_file_transfer:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Managed File Transfer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-2698998",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:soa_suite:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.2.0.0",
"product": {
"name": "vers:oracle/14.1.2.0.0",
"product_id": "CSAFPID-2698997",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:soa_suite:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle SOA Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1839896",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.1.0.0",
"product": {
"name": "vers:oracle/14.1.1.0.0",
"product_id": "CSAFPID-1839897",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.2.0.0",
"product": {
"name": "vers:oracle/14.1.2.0.0",
"product_id": "CSAFPID-1840030",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle WebLogic Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.5.7",
"product": {
"name": "vers:oracle/8.5.7",
"product_id": "CSAFPID-1839872",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Outside In Technology"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1840014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.1.0.0",
"product": {
"name": "vers:oracle/14.1.1.0.0",
"product_id": "CSAFPID-1839982",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.2.0.0",
"product": {
"name": "vers:oracle/14.1.2.0.0",
"product_id": "CSAFPID-2699125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:coherence:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Coherence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1839988",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Fusion Middleware MapViewer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-2698948",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle JDeveloper"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/14.1.1.0.0",
"product": {
"name": "vers:oracle/14.1.1.0.0",
"product_id": "CSAFPID-2699057",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:webcenter_forms_recognition:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle WebCenter Forms Recognition"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1840006",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle WebCenter Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-2698985",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Data Integrator"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1840028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.2.0.0",
"product": {
"name": "vers:oracle/14.1.2.0.0",
"product_id": "CSAFPID-2699064",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_activity_monitoring:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Business Activity Monitoring"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-2699044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:service_bus:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Service Bus"
}
],
"category": "product_family",
"name": "Oracle Fusion Middleware"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.4.0",
"product": {
"name": "vers:unknown/12.2.1.4.0",
"product_id": "CSAFPID-1213401"
}
}
],
"category": "product_name",
"name": "Managed File Transfer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.3.0",
"product": {
"name": "vers:unknown/12.2.1.3.0",
"product_id": "CSAFPID-1536644"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.4.0",
"product": {
"name": "vers:unknown/12.2.1.4.0",
"product_id": "CSAFPID-1536288"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14.1.1.0.0",
"product": {
"name": "vers:unknown/14.1.1.0.0",
"product_id": "CSAFPID-1536278"
}
}
],
"category": "product_name",
"name": "Weblogic Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/8.5.7",
"product": {
"name": "vers:unknown/8.5.7",
"product_id": "CSAFPID-1233360"
}
}
],
"category": "product_name",
"name": "Outside In Technology"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.4.0",
"product": {
"name": "vers:unknown/12.2.1.4.0",
"product_id": "CSAFPID-1210435"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14.1.1.0.0",
"product": {
"name": "vers:unknown/14.1.1.0.0",
"product_id": "CSAFPID-1210304"
}
}
],
"category": "product_name",
"name": "Coherence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.4.0",
"product": {
"name": "vers:unknown/12.2.1.4.0",
"product_id": "CSAFPID-1247956"
}
}
],
"category": "product_name",
"name": "Jdeveloper (Application)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.3.0",
"product": {
"name": "vers:unknown/12.2.1.3.0",
"product_id": "CSAFPID-1214253"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.4.0",
"product": {
"name": "vers:unknown/12.2.1.4.0",
"product_id": "CSAFPID-1232894"
}
}
],
"category": "product_name",
"name": "WebCenter Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.4.0",
"product": {
"name": "vers:unknown/12.2.1.4.0",
"product_id": "CSAFPID-1201529"
}
}
],
"category": "product_name",
"name": "Data Integrator"
}
],
"category": "product_family",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1144680",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.1.1.0.0",
"product": {
"name": "vers:oracle/14.1.1.0.0",
"product_id": "CSAFPID-1144604",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle WebLogic Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.4.0",
"product": {
"name": "vers:unknown/12.2.1.4.0",
"product_id": "CSAFPID-39413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/14.1.1.0.0",
"product": {
"name": "vers:unknown/14.1.1.0.0",
"product_id": "CSAFPID-39412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Coherence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.3.0",
"product": {
"name": "vers:oracle/12.2.1.3.0",
"product_id": "CSAFPID-1144910"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/12.2.1.4.0",
"product": {
"name": "vers:oracle/12.2.1.4.0",
"product_id": "CSAFPID-1144911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle WebCenter Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.3.0",
"product": {
"name": "vers:unknown/12.2.1.3.0",
"product_id": "CSAFPID-317201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/12.2.1.4.0",
"product": {
"name": "vers:unknown/12.2.1.4.0",
"product_id": "CSAFPID-307786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "WebCenter Portal"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-13936",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements Used in a Template Engine",
"title": "CWE-1336"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13936",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13936.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2020-13936"
},
{
"cve": "CVE-2020-25649",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-25649",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-25649.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2020-25649"
},
{
"cve": "CVE-2023-26464",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26464",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26464.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2023-26464"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-11612",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11612",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11612.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-11612"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-28168",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28168",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-28168"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29857",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-40896",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-40896"
},
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-47072"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52046",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-52046"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-23184",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json"
}
],
"title": "CVE-2025-23184"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2025-24970"
},
{
"cve": "CVE-2025-27363",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H",
"version": "3.1"
},
"products": [
"CSAFPID-2699078",
"CSAFPID-1839842",
"CSAFPID-2698989",
"CSAFPID-1839864",
"CSAFPID-2698967",
"CSAFPID-1213401",
"CSAFPID-1839938",
"CSAFPID-2699074",
"CSAFPID-2698998",
"CSAFPID-2698997",
"CSAFPID-1144680",
"CSAFPID-1839896",
"CSAFPID-1144604",
"CSAFPID-1839897",
"CSAFPID-1536644",
"CSAFPID-1840030",
"CSAFPID-1536288",
"CSAFPID-1536278",
"CSAFPID-1839872",
"CSAFPID-1233360",
"CSAFPID-39413",
"CSAFPID-1210435",
"CSAFPID-1210304",
"CSAFPID-39412",
"CSAFPID-1840014",
"CSAFPID-1839982",
"CSAFPID-2699125",
"CSAFPID-1839988",
"CSAFPID-1247956",
"CSAFPID-2698948",
"CSAFPID-2699057",
"CSAFPID-1144910",
"CSAFPID-1840006",
"CSAFPID-1144911",
"CSAFPID-1214253",
"CSAFPID-317201",
"CSAFPID-1232894",
"CSAFPID-307786",
"CSAFPID-1201529",
"CSAFPID-2698985",
"CSAFPID-1840028",
"CSAFPID-2699064",
"CSAFPID-2699044"
]
}
],
"title": "CVE-2025-27363"
}
]
}
ncsc-2025-0020
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse database producten en subsystemen, zoals de Core Database, Graal, Application Express, GoldenGate en REST data.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich in verschillende componenten van de Oracle Database, waaronder de Data Mining component en de Java VM. Deze kwetsbaarheden stellen laaggeprivilegieerde geauthenticeerde gebruikers in staat om het systeem te compromitteren, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie. De Java VM-kwetsbaarheid kan ook leiden tot ongeautoriseerde wijzigingen van gegevens.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Unchecked Error Condition",
"title": "CWE-391"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "general",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2025-01-22T13:30:16.354373Z",
"id": "NCSC-2025-0020",
"initial_release_date": "2025-01-22T13:30:16.354373Z",
"revision_history": [
{
"date": "2025-01-22T13:30:16.354373Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "graal_development_kit_for_micronaut",
"product": {
"name": "graal_development_kit_for_micronaut",
"product_id": "CSAFPID-1751216",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graal_development_kit_for_micronaut:23.5-23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_data_mining",
"product": {
"name": "database_-_data_mining",
"product_id": "CSAFPID-1751200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_data_mining:19.3-19.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_data_mining",
"product": {
"name": "database_-_data_mining",
"product_id": "CSAFPID-1751199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_data_mining:21.3-21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_migration_assistant_for_unicode",
"product": {
"name": "database_migration_assistant_for_unicode",
"product_id": "CSAFPID-1751212",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_migration_assistant_for_unicode:19.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_server",
"product": {
"name": "database_server",
"product_id": "CSAFPID-1503604",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_server:_java_vm___23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_graalvm_multilingual_engine",
"product": {
"name": "database_-_graalvm_multilingual_engine",
"product_id": "CSAFPID-1751223",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:21.4-21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_graalvm_multilingual_engine",
"product": {
"name": "database_-_graalvm_multilingual_engine",
"product_id": "CSAFPID-1751224",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:23.5-23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1751298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1751299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751093",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751094",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751095",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:23.4-23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rest_data_services",
"product": {
"name": "rest_data_services",
"product_id": "CSAFPID-711746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rest_data_services",
"product": {
"name": "rest_data_services",
"product_id": "CSAFPID-1751305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:rest_data_services:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rest_data_services",
"product": {
"name": "rest_data_services",
"product_id": "CSAFPID-1751304",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:rest_data_services:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188",
"CSAFPID-1751204",
"CSAFPID-1751203"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188",
"CSAFPID-1751204",
"CSAFPID-1751203"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188",
"CSAFPID-1751204",
"CSAFPID-1751203"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188",
"CSAFPID-1751204",
"CSAFPID-1751203"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45772",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-45772",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45772.json"
}
],
"title": "CVE-2024-45772"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650825",
"CSAFPID-1751298",
"CSAFPID-1751299"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650825",
"CSAFPID-1751298",
"CSAFPID-1751299"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-50379",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-50379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
}
],
"title": "CVE-2024-50379"
},
{
"cve": "CVE-2024-52316",
"cwe": {
"id": "CWE-391",
"name": "Unchecked Error Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Error Condition",
"title": "CWE-391"
},
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-52316",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52316.json"
}
],
"title": "CVE-2024-52316"
},
{
"cve": "CVE-2024-54677",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-54677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
}
],
"title": "CVE-2024-54677"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-21553",
"references": [
{
"category": "self",
"summary": "CVE-2025-21553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21553.json"
}
],
"title": "CVE-2025-21553"
},
{
"cve": "CVE-2025-21557",
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21557",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21557.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2025-21557"
},
{
"cve": "CVE-2022-26345",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751199",
"CSAFPID-1751200"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-26345",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26345.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751199",
"CSAFPID-1751200"
]
}
],
"title": "CVE-2022-26345"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-27043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json"
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-36730",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751203",
"CSAFPID-1751204"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-36730",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36730.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751203",
"CSAFPID-1751204"
]
}
],
"title": "CVE-2023-36730"
},
{
"cve": "CVE-2023-36785",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751203",
"CSAFPID-1751204"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-36785",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36785.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751203",
"CSAFPID-1751204"
]
}
],
"title": "CVE-2023-36785"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650767",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-711746",
"CSAFPID-816845",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-1751212"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650767",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-711746",
"CSAFPID-816845",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-1751212"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52428",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-342816",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-816845",
"CSAFPID-711746",
"CSAFPID-1751216"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-342816",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-816845",
"CSAFPID-711746",
"CSAFPID-1751216"
]
}
],
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6763",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751304",
"CSAFPID-1751305"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751304",
"CSAFPID-1751305"
]
}
],
"title": "CVE-2024-6763"
},
{
"cve": "CVE-2024-6923",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6923",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6923.json"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-8088",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8088.json"
}
],
"title": "CVE-2024-8088"
},
{
"cve": "CVE-2024-8927",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8927",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8927.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-8927"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-21211",
"cwe": {
"id": "CWE-922",
"name": "Insecure Storage of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751223",
"CSAFPID-1751224"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21211",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21211.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751223",
"CSAFPID-1751224"
]
}
],
"title": "CVE-2024-21211"
},
{
"cve": "CVE-2024-22262",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650825",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650825",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
}
],
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-24789",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24789",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24789.json"
}
],
"title": "CVE-2024-24789"
},
{
"cve": "CVE-2024-24790",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24790",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24790.json"
}
],
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-24791",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
}
],
"title": "CVE-2024-24791"
},
{
"cve": "CVE-2024-28757",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28757",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28757.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
}
],
"title": "CVE-2024-28757"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33600",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650825"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650825"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650825"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650825"
]
}
],
"title": "CVE-2024-38820"
}
]
}
ncsc-2025-0024
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende in staat om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Toegang tot gevoelige gegevens\n\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2025-01-22T13:32:27.142159Z",
"id": "NCSC-2025-0024",
"initial_release_date": "2025-01-22T13:32:27.142159Z",
"revision_history": [
{
"date": "2025-01-22T13:32:27.142159Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-249429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1506681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___7.5.35",
"product": {
"name": "mysql___7.5.35",
"product_id": "CSAFPID-1674684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___7.5.35:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___7.6.31",
"product": {
"name": "mysql___7.6.31",
"product_id": "CSAFPID-1674685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___7.6.31:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.0.35",
"product": {
"name": "mysql___8.0.35",
"product_id": "CSAFPID-1617768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.0.35:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.0.38",
"product": {
"name": "mysql___8.0.38",
"product_id": "CSAFPID-1617874",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.0.38:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.0.39",
"product": {
"name": "mysql___8.0.39",
"product_id": "CSAFPID-1674686",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.0.39:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.4.1",
"product": {
"name": "mysql___8.4.1",
"product_id": "CSAFPID-1674682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.4.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___8.4.2",
"product": {
"name": "mysql___8.4.2",
"product_id": "CSAFPID-1674687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___8.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___9.0.0",
"product": {
"name": "mysql___9.0.0",
"product_id": "CSAFPID-1674688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___9.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql___9.0.1",
"product": {
"name": "mysql___9.0.1",
"product_id": "CSAFPID-1674683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql___9.0.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1751129",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1673433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1751130",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1673432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1751131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1673434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1751132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connector\\/python",
"product": {
"name": "mysql_connector\\/python",
"product_id": "CSAFPID-1751151",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connector\\/python:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1751221",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.0.40_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1751219",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.4.3_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1751220",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_firewall",
"product": {
"name": "mysql_enterprise_firewall",
"product_id": "CSAFPID-1751124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:8.0.40_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_firewall",
"product": {
"name": "mysql_enterprise_firewall",
"product_id": "CSAFPID-1751125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:8.4.3_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_firewall",
"product": {
"name": "mysql_enterprise_firewall",
"product_id": "CSAFPID-1751126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1650794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1673429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1751119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1673179",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1673428",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1751120",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1673430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1751121",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-37519",
"product_status": {
"known_affected": [
"CSAFPID-1673428",
"CSAFPID-1751119"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-37519",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37519.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673428",
"CSAFPID-1751119"
]
}
],
"title": "CVE-2021-37519"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751219",
"CSAFPID-1751119",
"CSAFPID-1751220",
"CSAFPID-1751121",
"CSAFPID-1751120",
"CSAFPID-1751221",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751219",
"CSAFPID-1751119",
"CSAFPID-1751220",
"CSAFPID-1751121",
"CSAFPID-1751120",
"CSAFPID-1751221",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673432",
"CSAFPID-1673433",
"CSAFPID-1673434",
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673432",
"CSAFPID-1673433",
"CSAFPID-1673434",
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673432",
"CSAFPID-1673433",
"CSAFPID-1673434",
"CSAFPID-1506681",
"CSAFPID-1674682",
"CSAFPID-1674683",
"CSAFPID-1674684",
"CSAFPID-1674685",
"CSAFPID-1617768",
"CSAFPID-1674686",
"CSAFPID-1674687",
"CSAFPID-1674688",
"CSAFPID-1617874",
"CSAFPID-249429",
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673432",
"CSAFPID-1673433",
"CSAFPID-1673434",
"CSAFPID-1506681",
"CSAFPID-1674682",
"CSAFPID-1674683",
"CSAFPID-1674684",
"CSAFPID-1674685",
"CSAFPID-1617768",
"CSAFPID-1674686",
"CSAFPID-1674687",
"CSAFPID-1674688",
"CSAFPID-1617874",
"CSAFPID-249429",
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2025-21490",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21490"
},
{
"cve": "CVE-2025-21491",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21491"
},
{
"cve": "CVE-2025-21492",
"product_status": {
"known_affected": [
"CSAFPID-1650794",
"CSAFPID-1673179",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650794",
"CSAFPID-1673179",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21492"
},
{
"cve": "CVE-2025-21493",
"product_status": {
"known_affected": [
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21493",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21493.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21493"
},
{
"cve": "CVE-2025-21494",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21494",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21494.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21494"
},
{
"cve": "CVE-2025-21495",
"product_status": {
"known_affected": [
"CSAFPID-1751124",
"CSAFPID-1751125",
"CSAFPID-1751126",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21495",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21495.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751124",
"CSAFPID-1751125",
"CSAFPID-1751126",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21495"
},
{
"cve": "CVE-2025-21497",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21497",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21497.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21497"
},
{
"cve": "CVE-2025-21499",
"product_status": {
"known_affected": [
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21499",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21499.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21499"
},
{
"cve": "CVE-2025-21500",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21500",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21500.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21500"
},
{
"cve": "CVE-2025-21501",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21501",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21501.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21501"
},
{
"cve": "CVE-2025-21503",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21503",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21503.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21503"
},
{
"cve": "CVE-2025-21504",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21504",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21504.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21504"
},
{
"cve": "CVE-2025-21505",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21505",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21505.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21505"
},
{
"cve": "CVE-2025-21518",
"product_status": {
"known_affected": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21518",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21518.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21518"
},
{
"cve": "CVE-2025-21519",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21519",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21519.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21519"
},
{
"cve": "CVE-2025-21520",
"product_status": {
"known_affected": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21520",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21520.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 1.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21520"
},
{
"cve": "CVE-2025-21521",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21521",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21521.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21521"
},
{
"cve": "CVE-2025-21522",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21522",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21522.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21522"
},
{
"cve": "CVE-2025-21523",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21523",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21523.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21523"
},
{
"cve": "CVE-2025-21525",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21525",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21525.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21525"
},
{
"cve": "CVE-2025-21529",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21529",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21529.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21529"
},
{
"cve": "CVE-2025-21531",
"product_status": {
"known_affected": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21531",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21531.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21531"
},
{
"cve": "CVE-2025-21534",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21534",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21534.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21534"
},
{
"cve": "CVE-2025-21536",
"product_status": {
"known_affected": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21536",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21536.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673429",
"CSAFPID-1673428",
"CSAFPID-1673430",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21536"
},
{
"cve": "CVE-2025-21540",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21540",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21540.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21540"
},
{
"cve": "CVE-2025-21543",
"product_status": {
"known_affected": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21543",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21543.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751129",
"CSAFPID-1751130",
"CSAFPID-1751131",
"CSAFPID-1751132",
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21543"
},
{
"cve": "CVE-2025-21546",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21546",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21546.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21546"
},
{
"cve": "CVE-2025-21548",
"product_status": {
"known_affected": [
"CSAFPID-1751151",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21548",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21548.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751151",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21548"
},
{
"cve": "CVE-2025-21555",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21555"
},
{
"cve": "CVE-2025-21559",
"product_status": {
"known_affected": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751119",
"CSAFPID-1751120",
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21559"
},
{
"cve": "CVE-2025-21566",
"product_status": {
"known_affected": [
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21566",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21566.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21566"
},
{
"cve": "CVE-2025-21567",
"product_status": {
"known_affected": [
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21567",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21567.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751121",
"CSAFPID-1506681",
"CSAFPID-249429"
]
}
],
"title": "CVE-2025-21567"
}
]
}
rhsa-2025:1673
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the mysql:8.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nSecurity Fix(es):\n\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n\n* mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n\n* mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n\n* mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n\n* mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n\n* mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n\n* mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n\n* mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n\n* mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n\n* mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n\n* mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n\n* curl: curl netrc password leak (CVE-2024-11053)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n\n* mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n\n* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n\n* mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n\n* mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n\n* mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n\n* mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n\n* mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n\n* mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n\n* mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:1673",
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2301888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
},
{
"category": "external",
"summary": "2318857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
},
{
"category": "external",
"summary": "2318858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
},
{
"category": "external",
"summary": "2318870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
},
{
"category": "external",
"summary": "2318873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
},
{
"category": "external",
"summary": "2318874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
},
{
"category": "external",
"summary": "2318876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
},
{
"category": "external",
"summary": "2318882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
},
{
"category": "external",
"summary": "2318883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
},
{
"category": "external",
"summary": "2318884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
},
{
"category": "external",
"summary": "2318885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
},
{
"category": "external",
"summary": "2318886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
},
{
"category": "external",
"summary": "2318897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
},
{
"category": "external",
"summary": "2318900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
},
{
"category": "external",
"summary": "2318905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
},
{
"category": "external",
"summary": "2318914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
},
{
"category": "external",
"summary": "2318922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
},
{
"category": "external",
"summary": "2318923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
},
{
"category": "external",
"summary": "2318925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
},
{
"category": "external",
"summary": "2318926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
},
{
"category": "external",
"summary": "2318927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
},
{
"category": "external",
"summary": "2331191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
},
{
"category": "external",
"summary": "2339218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
},
{
"category": "external",
"summary": "2339220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
},
{
"category": "external",
"summary": "2339221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
},
{
"category": "external",
"summary": "2339226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
},
{
"category": "external",
"summary": "2339231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
},
{
"category": "external",
"summary": "2339236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
},
{
"category": "external",
"summary": "2339238",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
},
{
"category": "external",
"summary": "2339243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
},
{
"category": "external",
"summary": "2339247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
},
{
"category": "external",
"summary": "2339252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
},
{
"category": "external",
"summary": "2339259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
},
{
"category": "external",
"summary": "2339266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
},
{
"category": "external",
"summary": "2339270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
},
{
"category": "external",
"summary": "2339271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
},
{
"category": "external",
"summary": "2339275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
},
{
"category": "external",
"summary": "2339277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
},
{
"category": "external",
"summary": "2339281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
},
{
"category": "external",
"summary": "2339284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
},
{
"category": "external",
"summary": "2339291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
},
{
"category": "external",
"summary": "2339293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
},
{
"category": "external",
"summary": "2339295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
},
{
"category": "external",
"summary": "2339299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
},
{
"category": "external",
"summary": "2339300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
},
{
"category": "external",
"summary": "2339304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
},
{
"category": "external",
"summary": "2339305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
},
{
"category": "external",
"summary": "RHEL-40866",
"url": "https://issues.redhat.com/browse/RHEL-40866"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1673.json"
}
],
"title": "Red Hat Security Advisory: mysql:8.0 security update",
"tracking": {
"current_release_date": "2025-11-21T19:27:24+00:00",
"generator": {
"date": "2025-11-21T19:27:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:1673",
"initial_release_date": "2025-02-19T11:10:11+00:00",
"revision_history": [
{
"date": "2025-02-19T11:10:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-02-19T11:10:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:27:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
"product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
"product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
"product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
"product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294581"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the \u0027no overlap\u0027 response in ALPN or uses the output as the opportunistic protocol in NPN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_select_next_proto buffer overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "RHBZ#2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: SSL_select_next_proto buffer overread"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T04:33:09+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl, where libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: ASN.1 date parser overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is classified as low severity because it primarily results in a heap buffer over-read rather than a direct memory corruption or code execution risk. Since the ASN.1 parsing occurs after a successful TLS handshake, the malformed certificate must first bypass the TLS library\u0027s validation, which significantly reduces the likelihood of exploitation. \n\nAdditionally, the impact is limited to a potential crash or unintended heap data exposure through CURLINFO_CERTINFO, but not arbitrary code execution. The requirement for a specific TLS backend configuration and the controlled nature of the memory read further minimize its exploitability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"category": "external",
"summary": "RHBZ#2301888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\n\nRed Hat build of curl uses OpenSSL, which is not included in the affected list of GnuTLS, Schannel, Secure Transport and mbedTLS. Inspect which TLS backend is in use by running:\n\n$ curl --version\n\nCheck the reference for curl handled by the maintainers which may contain more relevant information around this vulnerability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libcurl: ASN.1 date parser overread"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-12-09T17:25:06.949000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331191"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl netrc password leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects curl when a `.netrc` file is used and a redirect is performed. Additionally, the `.netrc` must match the target hostname but the followed-to host does not have a password or both login and password configured.\n\nExample of a vulnerable .netrc configuration:\n\n~~~\nmachine a.com\n login alice\n password alicespassword\n\ndefault\n login bob\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"category": "external",
"summary": "RHBZ#2331191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "workaround",
"details": "Avoid using the .netrc file together with redirects.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: curl netrc password leak"
},
{
"cve": "CVE-2024-21193",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318923"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: PS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"category": "external",
"summary": "RHBZ#2318923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:35.495000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: PS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21194",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318914"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"category": "external",
"summary": "RHBZ#2318914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:35.850000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21196",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318858"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"category": "external",
"summary": "RHBZ#2318858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:36.816000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21197",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318874"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"category": "external",
"summary": "RHBZ#2318874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.130000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21198",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318925"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DDL unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"category": "external",
"summary": "RHBZ#2318925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.426000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DDL unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21199",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318922"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"category": "external",
"summary": "RHBZ#2318922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.770000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21201",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318882"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"category": "external",
"summary": "RHBZ#2318882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:38.423000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21203",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318885"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: FTS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"category": "external",
"summary": "RHBZ#2318885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:39.267000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: FTS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21212",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318886"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor). Supported versions that are affected are 8.0.39 and prior and 8.4.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"category": "external",
"summary": "RHBZ#2318886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:42.238000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21213",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318905"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"category": "external",
"summary": "RHBZ#2318905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:42.559000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21218",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318876"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"category": "external",
"summary": "RHBZ#2318876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:44.128000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21219",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318897"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DML unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"category": "external",
"summary": "RHBZ#2318897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:44.460000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DML unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21230",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318900"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"category": "external",
"summary": "RHBZ#2318900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:45.238000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21231",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318873"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"category": "external",
"summary": "RHBZ#2318873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:45.633000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21236",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318883"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"category": "external",
"summary": "RHBZ#2318883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.226000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21237",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318884"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"category": "external",
"summary": "RHBZ#2318884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.598000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21238",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318857"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.1 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"category": "external",
"summary": "RHBZ#2318857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.971000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21239",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318927"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"category": "external",
"summary": "RHBZ#2318927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:48.332000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21241",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318870"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"category": "external",
"summary": "RHBZ#2318870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:48.644000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21247",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318926"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"category": "external",
"summary": "RHBZ#2318926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:50.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2025-21490",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the MySQL Server component: InnoDB. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs, via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"category": "external",
"summary": "RHBZ#2339221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:52.253000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21491",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:03:32.601275+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a hang or frequently repeatable crash, resulting in a complete denial of service via network access through multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"category": "external",
"summary": "RHBZ#2339252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:52.647000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
},
{
"cve": "CVE-2025-21494",
"discovery_date": "2025-01-21T21:05:18.130554+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339277"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"category": "external",
"summary": "RHBZ#2339277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:53.805000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21497",
"discovery_date": "2025-01-21T21:01:05.496242+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339218"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"category": "external",
"summary": "RHBZ#2339218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:54.538000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21500",
"discovery_date": "2025-01-21T21:06:54.583473+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339300"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"category": "external",
"summary": "RHBZ#2339300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:55.678000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21501",
"discovery_date": "2025-01-21T21:04:52.611944+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339271"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"category": "external",
"summary": "RHBZ#2339271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:56.037000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21503",
"discovery_date": "2025-01-21T21:06:16.563221+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339291"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"category": "external",
"summary": "RHBZ#2339291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:56.818000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21504",
"discovery_date": "2025-01-21T21:02:24.819724+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339236"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21504"
},
{
"category": "external",
"summary": "RHBZ#2339236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:57.195000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21505",
"discovery_date": "2025-01-21T21:07:15.257978+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339305"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21505"
},
{
"category": "external",
"summary": "RHBZ#2339305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:57.648000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21518",
"discovery_date": "2025-01-21T21:06:24.968915+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339293"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21518"
},
{
"category": "external",
"summary": "RHBZ#2339293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:03.419000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21519",
"discovery_date": "2025-01-21T21:05:34.782135+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339281"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21519"
},
{
"category": "external",
"summary": "RHBZ#2339281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:03.812000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21520",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2025-01-21T21:01:15.087444+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339220"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (component: Options). This issue may allow unauthorized read access to a subset of MySQL Server data via a high-privileged attacker with logon to the infrastructure and requires human interaction from another user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server Options Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21520"
},
{
"category": "external",
"summary": "RHBZ#2339220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:04.217000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: MySQL Server Options Vulnerability"
},
{
"cve": "CVE-2025-21521",
"discovery_date": "2025-01-21T21:04:48.403277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339270"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21521"
},
{
"category": "external",
"summary": "RHBZ#2339270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:04.705000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21522",
"discovery_date": "2025-01-21T21:05:46.684614+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339284"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Parser unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21522"
},
{
"category": "external",
"summary": "RHBZ#2339284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:05.137000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Parser unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21523",
"discovery_date": "2025-01-21T21:07:11.251899+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339304"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21523"
},
{
"category": "external",
"summary": "RHBZ#2339304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:05.511000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21525",
"discovery_date": "2025-01-21T21:04:02.333411+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339259"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DDL unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21525"
},
{
"category": "external",
"summary": "RHBZ#2339259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:06.259000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DDL unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21529",
"discovery_date": "2025-01-21T21:01:41.718371+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339226"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Information Schema unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21529"
},
{
"category": "external",
"summary": "RHBZ#2339226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:07.906000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Information Schema unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21531",
"discovery_date": "2025-01-21T21:02:03.867196+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339231"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21531"
},
{
"category": "external",
"summary": "RHBZ#2339231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:08.723000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21534",
"discovery_date": "2025-01-21T21:05:09.810100+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339275"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Performance Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Performance Schema unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21534"
},
{
"category": "external",
"summary": "RHBZ#2339275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:09.873000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Performance Schema unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21536",
"discovery_date": "2025-01-21T21:04:31.799644+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339266"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21536"
},
{
"category": "external",
"summary": "RHBZ#2339266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:10.654000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21540",
"discovery_date": "2025-01-21T21:02:33.051436+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339238"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21540"
},
{
"category": "external",
"summary": "RHBZ#2339238",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:12.277000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21543",
"discovery_date": "2025-01-21T21:03:11.756360+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339247"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Packaging unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21543"
},
{
"category": "external",
"summary": "RHBZ#2339247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:13.601000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Packaging unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21546",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"discovery_date": "2025-01-21T21:06:50.582476+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339299"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server (component: Security: Privileges). This issue can allow unauthorized update, insert, or delete access to MySQL Server data and unauthorized read access to a subset of data via multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Privilege Misuse in MySQL Server Security Component",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21546"
},
{
"category": "external",
"summary": "RHBZ#2339299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:14.687000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Privilege Misuse in MySQL Server Security Component"
},
{
"cve": "CVE-2025-21555",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:02:53.591790+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339243"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs and unauthorized modification, such as updating, inserting, or deleting accessible data via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21555"
},
{
"category": "external",
"summary": "RHBZ#2339243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:18.135000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
},
{
"cve": "CVE-2025-21559",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:06:33.774888+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339295"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, causing frequent crashes or hangs, and unauthorized modification to including updating, inserting, and deleting accessible data via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21559"
},
{
"category": "external",
"summary": "RHBZ#2339295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:53:19.677000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T11:10:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
"AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
}
]
}
rhsa-2025:1671
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mysql is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nSecurity Fix(es):\n\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n\n* mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n\n* mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n\n* mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n\n* mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n\n* mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n\n* mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n\n* mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n\n* mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n\n* mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n\n* mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n\n* curl: curl netrc password leak (CVE-2024-11053)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n\n* mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n\n* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n\n* mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n\n* mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n\n* mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n\n* mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n\n* mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n\n* mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n\n* mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:1671",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "2301888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
},
{
"category": "external",
"summary": "2318857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
},
{
"category": "external",
"summary": "2318858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
},
{
"category": "external",
"summary": "2318870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
},
{
"category": "external",
"summary": "2318873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
},
{
"category": "external",
"summary": "2318874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
},
{
"category": "external",
"summary": "2318876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
},
{
"category": "external",
"summary": "2318882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
},
{
"category": "external",
"summary": "2318883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
},
{
"category": "external",
"summary": "2318884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
},
{
"category": "external",
"summary": "2318885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
},
{
"category": "external",
"summary": "2318886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
},
{
"category": "external",
"summary": "2318897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
},
{
"category": "external",
"summary": "2318900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
},
{
"category": "external",
"summary": "2318905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
},
{
"category": "external",
"summary": "2318914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
},
{
"category": "external",
"summary": "2318922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
},
{
"category": "external",
"summary": "2318923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
},
{
"category": "external",
"summary": "2318925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
},
{
"category": "external",
"summary": "2318926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
},
{
"category": "external",
"summary": "2318927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
},
{
"category": "external",
"summary": "2331191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
},
{
"category": "external",
"summary": "2339218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
},
{
"category": "external",
"summary": "2339220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
},
{
"category": "external",
"summary": "2339221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
},
{
"category": "external",
"summary": "2339226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
},
{
"category": "external",
"summary": "2339231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
},
{
"category": "external",
"summary": "2339236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
},
{
"category": "external",
"summary": "2339238",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
},
{
"category": "external",
"summary": "2339243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
},
{
"category": "external",
"summary": "2339247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
},
{
"category": "external",
"summary": "2339252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
},
{
"category": "external",
"summary": "2339259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
},
{
"category": "external",
"summary": "2339266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
},
{
"category": "external",
"summary": "2339270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
},
{
"category": "external",
"summary": "2339271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
},
{
"category": "external",
"summary": "2339275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
},
{
"category": "external",
"summary": "2339277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
},
{
"category": "external",
"summary": "2339281",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
},
{
"category": "external",
"summary": "2339284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
},
{
"category": "external",
"summary": "2339291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
},
{
"category": "external",
"summary": "2339293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
},
{
"category": "external",
"summary": "2339295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
},
{
"category": "external",
"summary": "2339299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
},
{
"category": "external",
"summary": "2339300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
},
{
"category": "external",
"summary": "2339304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
},
{
"category": "external",
"summary": "2339305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
},
{
"category": "external",
"summary": "RHEL-40867",
"url": "https://issues.redhat.com/browse/RHEL-40867"
},
{
"category": "external",
"summary": "RHEL-5470",
"url": "https://issues.redhat.com/browse/RHEL-5470"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1671.json"
}
],
"title": "Red Hat Security Advisory: mysql security update",
"tracking": {
"current_release_date": "2025-11-21T19:27:22+00:00",
"generator": {
"date": "2025-11-21T19:27:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:1671",
"initial_release_date": "2025-02-19T10:31:41+00:00",
"revision_history": [
{
"date": "2025-02-19T10:31:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-02-19T10:31:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:27:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.src",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.src",
"product_id": "mysql-0:8.0.41-2.el9_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"product": {
"name": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"product_id": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"product": {
"name": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"product_id": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"product": {
"name": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"product_id": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-common-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-common-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-common-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-server-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-server-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:8.0.41-2.el9_5.s390x",
"product": {
"name": "mysql-test-0:8.0.41-2.el9_5.s390x",
"product_id": "mysql-test-0:8.0.41-2.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-common-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-common-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-server-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-test-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
},
"product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294581"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the \u0027no overlap\u0027 response in ALPN or uses the output as the opportunistic protocol in NPN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_select_next_proto buffer overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "RHBZ#2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: SSL_select_next_proto buffer overread"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T04:33:09+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl, where libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: ASN.1 date parser overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability is classified as low severity because it primarily results in a heap buffer over-read rather than a direct memory corruption or code execution risk. Since the ASN.1 parsing occurs after a successful TLS handshake, the malformed certificate must first bypass the TLS library\u0027s validation, which significantly reduces the likelihood of exploitation. \n\nAdditionally, the impact is limited to a potential crash or unintended heap data exposure through CURLINFO_CERTINFO, but not arbitrary code execution. The requirement for a specific TLS backend configuration and the controlled nature of the memory read further minimize its exploitability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"category": "external",
"summary": "RHBZ#2301888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\n\nRed Hat build of curl uses OpenSSL, which is not included in the affected list of GnuTLS, Schannel, Secure Transport and mbedTLS. Inspect which TLS backend is in use by running:\n\n$ curl --version\n\nCheck the reference for curl handled by the maintainers which may contain more relevant information around this vulnerability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libcurl: ASN.1 date parser overread"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-12-09T17:25:06.949000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331191"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl netrc password leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects curl when a `.netrc` file is used and a redirect is performed. Additionally, the `.netrc` must match the target hostname but the followed-to host does not have a password or both login and password configured.\n\nExample of a vulnerable .netrc configuration:\n\n~~~\nmachine a.com\n login alice\n password alicespassword\n\ndefault\n login bob\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"category": "external",
"summary": "RHBZ#2331191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "workaround",
"details": "Avoid using the .netrc file together with redirects.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: curl netrc password leak"
},
{
"cve": "CVE-2024-21193",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318923"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: PS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"category": "external",
"summary": "RHBZ#2318923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:35.495000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: PS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21194",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318914"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"category": "external",
"summary": "RHBZ#2318914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:35.850000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21196",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318858"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"category": "external",
"summary": "RHBZ#2318858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:36.816000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21197",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318874"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"category": "external",
"summary": "RHBZ#2318874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.130000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21198",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318925"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DDL unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"category": "external",
"summary": "RHBZ#2318925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.426000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DDL unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21199",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318922"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"category": "external",
"summary": "RHBZ#2318922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:37.770000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21201",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318882"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"category": "external",
"summary": "RHBZ#2318882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:38.423000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21203",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318885"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: FTS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"category": "external",
"summary": "RHBZ#2318885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:39.267000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: FTS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21212",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318886"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor). Supported versions that are affected are 8.0.39 and prior and 8.4.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"category": "external",
"summary": "RHBZ#2318886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:42.238000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21213",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318905"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"category": "external",
"summary": "RHBZ#2318905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:42.559000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21218",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318876"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"category": "external",
"summary": "RHBZ#2318876",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:44.128000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21219",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318897"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: DML unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"category": "external",
"summary": "RHBZ#2318897",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:44.460000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: DML unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21230",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318900"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"category": "external",
"summary": "RHBZ#2318900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:45.238000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21231",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318873"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"category": "external",
"summary": "RHBZ#2318873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:45.633000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21236",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318883"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"category": "external",
"summary": "RHBZ#2318883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.226000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21237",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318884"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"category": "external",
"summary": "RHBZ#2318884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.598000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21238",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318857"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.1 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"category": "external",
"summary": "RHBZ#2318857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:47.971000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21239",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318927"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"category": "external",
"summary": "RHBZ#2318927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:48.332000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21241",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318870"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"category": "external",
"summary": "RHBZ#2318870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:48.644000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-21247",
"discovery_date": "2024-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2318926"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"category": "external",
"summary": "RHBZ#2318926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-10-15T19:52:50.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)"
},
{
"cve": "CVE-2024-37371",
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294676"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "krb5: GSS message token handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"category": "external",
"summary": "RHBZ#2294676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
},
{
"category": "external",
"summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
"url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "krb5: GSS message token handling"
},
{
"cve": "CVE-2025-21490",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the MySQL Server component: InnoDB. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs, via multiple network protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"category": "external",
"summary": "RHBZ#2339221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:52.253000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21491",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2025-01-21T21:03:32.601275+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a hang or frequently repeatable crash, resulting in a complete denial of service via network access through multiple protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"category": "external",
"summary": "RHBZ#2339252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:52.647000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
},
{
"cve": "CVE-2025-21494",
"discovery_date": "2025-01-21T21:05:18.130554+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339277"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"category": "external",
"summary": "RHBZ#2339277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:53.805000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21497",
"discovery_date": "2025-01-21T21:01:05.496242+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339218"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"category": "external",
"summary": "RHBZ#2339218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:54.538000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21500",
"discovery_date": "2025-01-21T21:06:54.583473+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339300"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"category": "external",
"summary": "RHBZ#2339300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:55.678000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21501",
"discovery_date": "2025-01-21T21:04:52.611944+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339271"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"category": "external",
"summary": "RHBZ#2339271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:56.037000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
},
{
"cve": "CVE-2025-21503",
"discovery_date": "2025-01-21T21:06:16.563221+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2339291"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"category": "external",
"summary": "RHBZ#2339291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
}
],
"release_date": "2025-01-21T20:52:56.818000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-19T10:31:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAI